Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0001 (GCVE-0-2008-0001)
Vulnerability from cvelistv5 – Published: 2008-01-15 19:00 – Updated: 2024-08-07 07:32- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:24.151Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"name": "ADV-2008-0151",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0151"
},
{
"name": "28806",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28806"
},
{
"name": "28643",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28643"
},
{
"name": "28628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28628"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"name": "28485",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28485"
},
{
"name": "20080117 rPSA-2008-0021-1 kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"name": "28706",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28706"
},
{
"name": "28626",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28626"
},
{
"name": "DSA-1479",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"name": "MDVSA-2008:112",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"name": "28558",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28558"
},
{
"name": "SUSE-SA:2008:013",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"name": "oval:org.mitre.oval:def:9709",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"name": "MDVSA-2008:044",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "29245",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29245"
},
{
"name": "28664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28664"
},
{
"name": "1019289",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019289"
},
{
"name": "SUSE-SA:2008:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"name": "28748",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28748"
},
{
"name": "USN-574-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"name": "linux-directory-security-bypass(39672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"name": "FEDORA-2008-0748",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
},
{
"name": "28971",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28971"
},
{
"name": "RHSA-2008:0089",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"name": "USN-578-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"name": "27280",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27280"
},
{
"name": "RHSA-2008:0055",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"name": "ADV-2008-0151",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0151"
},
{
"name": "28806",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28806"
},
{
"name": "28643",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28643"
},
{
"name": "28628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28628"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"name": "28485",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28485"
},
{
"name": "20080117 rPSA-2008-0021-1 kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"name": "28706",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28706"
},
{
"name": "28626",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28626"
},
{
"name": "DSA-1479",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"name": "MDVSA-2008:112",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"name": "28558",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28558"
},
{
"name": "SUSE-SA:2008:013",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"name": "oval:org.mitre.oval:def:9709",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"name": "MDVSA-2008:044",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "29245",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29245"
},
{
"name": "28664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28664"
},
{
"name": "1019289",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019289"
},
{
"name": "SUSE-SA:2008:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"name": "28748",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28748"
},
{
"name": "USN-574-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"name": "linux-directory-security-bypass(39672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"name": "FEDORA-2008-0748",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
},
{
"name": "28971",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28971"
},
{
"name": "RHSA-2008:0089",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"name": "USN-578-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"name": "27280",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27280"
},
{
"name": "RHSA-2008:0055",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-0001",
"datePublished": "2008-01-15T19:00:00.000Z",
"dateReserved": "2007-12-03T00:00:00.000Z",
"dateUpdated": "2024-08-07T07:32:24.151Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-0001",
"date": "2026-05-24",
"epss": "0.00038",
"percentile": "0.11496"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6.22.15\", \"matchCriteriaId\": \"6A120078-D32C-462F-BB51-E195A9E7265E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5301E27-8021-467C-A9A2-AF2137EF0299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79787868-2D77-4B55-AD61-C2B357CCE047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455E647F-73DD-400A-AA19-3D93FE2E57AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB515243-7519-4CA4-9267-D9A6798CBC49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B672E1B6-E8E9-473F-853F-906EA56D712E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DE32C2-5B07-4812-9F88-000F5FB000C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936B7EE-9CD1-4698-AD67-C619D0171A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25379B32-D898-4E44-A740-978A129B5E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90F8F2-9549-413D-9676-3EF634D832B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BEE46-088A-494E-8E18-03F33F6BBEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF35478-B292-4A00-B985-CEEDE8B212C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7344B707-6145-48BA-8BC9-9B140A260BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B753112-CCDE-4870-AA97-4AAA2946421A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B3AFE7-F4FF-4144-9046-E5926E305A03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7616E197-ACCA-4191-A513-FD48417C7F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE2F94D-E8E0-4BB7-A910-378012580025\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F5AE3B-B701-4579-B44A-0F7A4267852E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E452E4-45A9-4469-BF69-F40B6598F0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48777A01-8F36-4752-8F7A-1D1686C69A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747F1324-AEFA-496F-9447-12CD13114F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795C3B17-687E-4F33-AA99-8FEC16F14693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900D6742-DE0F-45C5-A812-BF84088CB02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D88ED3C4-64C5-44B2-9F23-E16087046C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FB31E5-190C-489A-AB30-910D2CC854F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6316369-B54A-4E59-A022-E0610353B284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073C3CE0-E12D-4545-8460-5A1514271D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83700989-8820-48DA-A9FE-6A77DF1E8439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F4CEC-7781-468B-B460-4F487B7C6601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C75A62-8807-4821-9362-1E0D63C0A1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC36074C-C310-4341-8B3C-BB34E572BF94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECCC155A-C68C-44A8-8C44-7979C9889C34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"040EBFDA-7F8D-428F-BB69-BB1B52BB868B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"69E703D2-8CC9-421A-9728-75E8FCFB4FE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D25556CC-C522-4C79-99DD-9A7329697B8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9960640-F02D-4E81-A34B-1893D8FD7F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C398D26-7132-4A6E-9003-77246644451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B21D90E-5172-485E-87AC-F1681604AD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641EECFD-A985-4026-A53A-10FBE47EAD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47595F81-2083-4236-A0B0-E2B98DD78402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F5FC758-5A5D-466A-8386-5FC469F79F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12547B6B-78F1-4426-81CE-5F208794658C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38429E64-276B-46D4-AACD-05349D6F6615\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E89640F8-313B-4A36-A591-36645D1EF838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B42F06-AC6D-40F3-BC03-5126BED48F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8002C7-19E2-4F20-890E-4BA2029174D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53037B40-D534-41D1-9895-8EDB0D884C3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549096F-C640-463E-AD07-FD8D254CC098\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8DCAF19-879C-42BB-B56A-84504E79758A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"980A6C7D-6175-4A44-8377-74AA7A9FD108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C226902-04D9-4F32-866C-20225841ECF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1F65DF2-2794-47B7-9676-CCF150683CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1817C772-D367-4ABE-B835-466D31A6DC89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9484B41A-DFB6-4481-80D8-440C711CEA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2975DF7-F916-456C-BF7C-2694559E5282\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821BD11F-3C6A-4424-BC9B-DFD786248B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F55A024-9F8E-44F8-A0D8-696BC232524A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB759752-DC19-4750-838B-056063EFDC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99662904-E5E3-4E81-B199-39707EAEB652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"615BDD1D-36AA-4976-909B-F0F66BF1090C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B179CF1D-084D-4B21-956F-E55AC6BDE026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"432CA976-6EFA-4D34-B5EA-CD772D067F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E476195-657E-416E-BC16-44A18B06A133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70460F6C-D6C0-4C1A-B13E-368705EAF223\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBFF148-3EDA-4216-910B-8930D8C443C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5140380C-71BD-464F-AE53-1814C2653056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18EC0A7-8616-4039-B98B-E1216E035B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22FB141B-FA2A-435D-8937-83FC0669CB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FC6CE2-8717-4558-A309-A441D322F00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311BE336-7BB2-47C0-AED5-3DEA706C206F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AAC2E9D-0E82-4866-9046-ADD448418198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.\"}, {\"lang\": \"es\", \"value\": \"VFS en el kernel de Linux versiones anteriores a 2.6.22.16 y versiones 2.6.23.x anteriores a 2.6.23.14, realiza pruebas de modo de acceso mediante el uso de la variable flag en lugar de la variable acc_mode, lo que podr\\u00eda permitir a usuarios locales omitir los permisos previstos y eliminar directorios.\"}]",
"id": "CVE-2008-0001",
"lastModified": "2024-11-21T00:40:56.850",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:P/A:P\", \"baseScore\": 3.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-01-15T20:00:00.000",
"references": "[{\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2008-0055.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28485\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28558\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28626\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28628\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28643\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28664\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28706\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28748\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28806\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28971\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29245\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1019289\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1479\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:112\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0089.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/486485/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/27280\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-574-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-578-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0151\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/39672\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-2146\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2008-0055.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28485\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28626\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28628\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28643\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28664\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28706\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28748\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28806\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28971\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29245\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1019289\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1479\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0089.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/486485/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/27280\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-574-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-578-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0151\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/39672\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-2146\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-0001\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-01-15T20:00:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.\"},{\"lang\":\"es\",\"value\":\"VFS en el kernel de Linux versiones anteriores a 2.6.22.16 y versiones 2.6.23.x anteriores a 2.6.23.14, realiza pruebas de modo de acceso mediante el uso de la variable flag en lugar de la variable acc_mode, lo que podr\u00eda permitir a usuarios locales omitir los permisos previstos y eliminar directorios.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.22.15\",\"matchCriteriaId\":\"6A120078-D32C-462F-BB51-E195A9E7265E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB515243-7519-4CA4-9267-D9A6798CBC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B672E1B6-E8E9-473F-853F-906EA56D712E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC36074C-C310-4341-8B3C-BB34E572BF94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECCC155A-C68C-44A8-8C44-7979C9889C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"040EBFDA-7F8D-428F-BB69-BB1B52BB868B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E703D2-8CC9-421A-9728-75E8FCFB4FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25556CC-C522-4C79-99DD-9A7329697B8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0055.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28485\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28558\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28626\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28628\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28643\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28664\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28706\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28748\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28806\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28971\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1019289\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1479\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:112\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0089.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/486485/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27280\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-574-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-578-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0151\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39672\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2146\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28628\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28706\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28971\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1019289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0089.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/486485/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27280\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-574-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-578-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2146\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2008-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans le noyau Linux permettant de contourner la politique de sécurité et de corrompre le système de fichiers a été corrigée.
Description
La vulnérabilité est due à une mauvaise gestion des droits d'accès lors de l'ouverture d'un repertoire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Les versions du noyau Linux 2.6.22 ant\u00e9rieures \u00e0 la 2.6.22.16 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "les versions du noyau Linux 2.6.23 ant\u00e9rieures \u00e0 la 2.6.23.14.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLa vuln\u00e9rabilit\u00e9 est due \u00e0 une mauvaise gestion des droits d\u0027acc\u00e8s lors\nde l\u0027ouverture d\u0027un repertoire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0001"
}
],
"links": [
{
"title": "Bulletin de mise \u00e0 jour du noyau Linux 2.6.23.14 du 14 janvier 2008 :",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"title": "Bulletin de mise \u00e0 jour du noyau Linux 2.6.22.16 du 14 janvier 2008 :",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
}
],
"reference": "CERTA-2008-AVI-026",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans le noyau Linux permettant de contourner la\npolitique de s\u00e9curit\u00e9 et de corrompre le syst\u00e8me de fichiers a \u00e9t\u00e9\ncorrig\u00e9e.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de mise \u00e0 jour Linux 2.6.22.16 et 2.6.23.14 du 14 janvier 2008",
"url": null
}
]
}
CERTA-2008-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans le noyau Linux permettant de contourner la politique de sécurité et de corrompre le système de fichiers a été corrigée.
Description
La vulnérabilité est due à une mauvaise gestion des droits d'accès lors de l'ouverture d'un repertoire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Les versions du noyau Linux 2.6.22 ant\u00e9rieures \u00e0 la 2.6.22.16 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "les versions du noyau Linux 2.6.23 ant\u00e9rieures \u00e0 la 2.6.23.14.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLa vuln\u00e9rabilit\u00e9 est due \u00e0 une mauvaise gestion des droits d\u0027acc\u00e8s lors\nde l\u0027ouverture d\u0027un repertoire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0001"
}
],
"links": [
{
"title": "Bulletin de mise \u00e0 jour du noyau Linux 2.6.23.14 du 14 janvier 2008 :",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"title": "Bulletin de mise \u00e0 jour du noyau Linux 2.6.22.16 du 14 janvier 2008 :",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
}
],
"reference": "CERTA-2008-AVI-026",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans le noyau Linux permettant de contourner la\npolitique de s\u00e9curit\u00e9 et de corrompre le syst\u00e8me de fichiers a \u00e9t\u00e9\ncorrig\u00e9e.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de mise \u00e0 jour Linux 2.6.22.16 et 2.6.23.14 du 14 janvier 2008",
"url": null
}
]
}
FKIE_CVE-2008-0001
Vulnerability from fkie_nvd - Published: 2008-01-15 20:00 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A120078-D32C-462F-BB51-E195A9E7265E",
"versionEndIncluding": "2.6.22.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FC106BDA-2EA4-41A2-AA01-6352A5C255B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB515243-7519-4CA4-9267-D9A6798CBC49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B672E1B6-E8E9-473F-853F-906EA56D712E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7936B7EE-9CD1-4698-AD67-C619D0171A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5738D628-0B2D-4F56-9427-2009BFCB6C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EBCB4-FCF4-479A-A44D-D913F7F09C77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD34526D-F2CC-44C5-991D-B1E41C327860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F0B900-34E9-4545-B7AE-AF0A4363EACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B36F432D-FED1-4B8D-A458-BEDEEF306AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25379B32-D898-4E44-A740-978A129B5E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B90F8F2-9549-413D-9676-3EF634D832B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "915E64EF-6EEC-4DE2-A285-5F3FCE389645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "585BEE46-088A-494E-8E18-03F33F6BBEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF35478-B292-4A00-B985-CEEDE8B212C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E85846A-61BE-4896-B4A6-42A7E1DBA515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E3B925-031D-4F6D-915A-A16F0FFA878C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "66F5AE3B-B701-4579-B44A-0F7A4267852E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"matchCriteriaId": "03FB31E5-190C-489A-AB30-910D2CC854F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4A781A-4A41-466F-8426-10B40CF8BA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F6316369-B54A-4E59-A022-E0610353B284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"matchCriteriaId": "073C3CE0-E12D-4545-8460-5A1514271D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"matchCriteriaId": "670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB33DEA-13C7-4B36-AB8A-ED680679A071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"matchCriteriaId": "86DD0FCC-BB12-410D-8C82-AB99C7C5311E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"matchCriteriaId": "83700989-8820-48DA-A9FE-6A77DF1E8439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9F4CEC-7781-468B-B460-4F487B7C6601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"matchCriteriaId": "67C75A62-8807-4821-9362-1E0D63C0A1B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"matchCriteriaId": "894D4812-D62F-489E-8D0E-5E9468CE8EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92E01-4F08-4364-9E87-FFBC095E32E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc1:*:*:*:*:*:*",
"matchCriteriaId": "EC36074C-C310-4341-8B3C-BB34E572BF94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECCC155A-C68C-44A8-8C44-7979C9889C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc3:*:*:*:*:*:*",
"matchCriteriaId": "040EBFDA-7F8D-428F-BB69-BB1B52BB868B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc4:*:*:*:*:*:*",
"matchCriteriaId": "69E703D2-8CC9-421A-9728-75E8FCFB4FE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc5:*:*:*:*:*:*",
"matchCriteriaId": "D25556CC-C522-4C79-99DD-9A7329697B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F9960640-F02D-4E81-A34B-1893D8FD7F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D00DAD-4F2D-45C7-B87C-85118D9DD855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0C398D26-7132-4A6E-9003-77246644451B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5EED2DA2-2516-42E9-8A33-0FA64BF51DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FF425F00-41BA-4F59-A0DE-6362A1E9A142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"matchCriteriaId": "33577E79-1B6E-406D-A49B-2CEF1754F5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"matchCriteriaId": "8B21D90E-5172-485E-87AC-F1681604AD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C41F6822-92BF-43F5-8B3E-8BAF9E9A320D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"matchCriteriaId": "641EECFD-A985-4026-A53A-10FBE47EAD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"matchCriteriaId": "47595F81-2083-4236-A0B0-E2B98DD78402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5FC758-5A5D-466A-8386-5FC469F79F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA5C83-5293-4107-8E6A-85F82ECF2C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D0AADC-BC34-40FB-BD69-37981DC8E971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"matchCriteriaId": "12547B6B-78F1-4426-81CE-5F208794658C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"matchCriteriaId": "38429E64-276B-46D4-AACD-05349D6F6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E89640F8-313B-4A36-A591-36645D1EF838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0271F0-41F2-4096-8C91-DAD1A81AF855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"matchCriteriaId": "7A40DCBB-B41B-468E-A918-6EA3F9A125E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"matchCriteriaId": "921B6A54-85E3-4867-8EDF-93EB86BAFBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"matchCriteriaId": "2B004CF1-0ACC-441C-9F61-9B20504F4ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"matchCriteriaId": "04B42F06-AC6D-40F3-BC03-5126BED48F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8002C7-19E2-4F20-890E-4BA2029174D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"matchCriteriaId": "34FC90C2-AED0-4EAF-B5E8-DE75961DA26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DA9C54-742C-4057-8BAB-18755B4A42D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"matchCriteriaId": "84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"matchCriteriaId": "53037B40-D534-41D1-9895-8EDB0D884C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"matchCriteriaId": "5549096F-C640-463E-AD07-FD8D254CC098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F8DCAF19-879C-42BB-B56A-84504E79758A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0E249774-CE05-43D5-A5A3-7CCE24BB2AD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D42BA44-C69B-4170-9867-CABF93CA9BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories."
},
{
"lang": "es",
"value": "VFS en el kernel de Linux versiones anteriores a 2.6.22.16 y versiones 2.6.23.x anteriores a 2.6.23.14, realiza pruebas de modo de acceso mediante el uso de la variable flag en lugar de la variable acc_mode, lo que podr\u00eda permitir a usuarios locales omitir los permisos previstos y eliminar directorios."
}
],
"id": "CVE-2008-0001",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-01-15T20:00:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"source": "secalert@redhat.com",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28485"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28558"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28626"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28628"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28643"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28664"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28706"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28748"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28806"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28971"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29245"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1019289"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"source": "secalert@redhat.com",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/27280"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0151"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28628"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28643"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28706"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28806"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28971"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1019289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/27280"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0151"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-W48M-WGG4-PF34
Vulnerability from github – Published: 2022-05-01 23:27 – Updated: 2022-05-01 23:27VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
{
"affected": [],
"aliases": [
"CVE-2008-0001"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-01-15T20:00:00Z",
"severity": "LOW"
},
"details": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"id": "GHSA-w48m-wgg4-pf34",
"modified": "2022-05-01T23:27:15Z",
"published": "2022-05-01T23:27:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"type": "WEB",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28485"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28558"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28626"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28628"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28643"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28664"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28706"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28748"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28806"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28971"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29245"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1019289"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/27280"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0151"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2008-0001
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2008-0001",
"description": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"id": "GSD-2008-0001",
"references": [
"https://www.suse.com/security/cve/CVE-2008-0001.html",
"https://www.debian.org/security/2008/dsa-1479",
"https://access.redhat.com/errata/RHSA-2008:0089",
"https://access.redhat.com/errata/RHSA-2008:0055",
"https://linux.oracle.com/cve/CVE-2008-0001.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-0001"
],
"details": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"id": "GSD-2008-0001",
"modified": "2023-12-13T01:22:58.463209Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"name": "http://secunia.com/advisories/28806",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28806"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "http://secunia.com/advisories/29245",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29245"
},
{
"name": "http://secunia.com/advisories/28706",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28706"
},
{
"name": "http://www.ubuntu.com/usn/usn-574-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2008-0055.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
},
{
"name": "http://secunia.com/advisories/28748",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28748"
},
{
"name": "http://secunia.com/advisories/28971",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28971"
},
{
"name": "http://www.ubuntu.com/usn/usn-578-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16",
"refsource": "MISC",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"name": "http://secunia.com/advisories/28485",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28485"
},
{
"name": "http://secunia.com/advisories/28558",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28558"
},
{
"name": "http://secunia.com/advisories/28626",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28626"
},
{
"name": "http://secunia.com/advisories/28628",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28628"
},
{
"name": "http://secunia.com/advisories/28643",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28643"
},
{
"name": "http://secunia.com/advisories/28664",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28664"
},
{
"name": "http://securitytracker.com/id?1019289",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1019289"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021",
"refsource": "MISC",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"name": "http://www.debian.org/security/2008/dsa-1479",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14",
"refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0089.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"name": "http://www.securityfocus.com/archive/1/486485/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/27280",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/27280"
},
{
"name": "http://www.vupen.com/english/advisories/2008/0151",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/0151"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"name": "https://issues.rpath.com/browse/RPL-2146",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.6.22.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0001"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14"
},
{
"name": "27280",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/27280"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16"
},
{
"name": "28485",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28485"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021"
},
{
"name": "https://issues.rpath.com/browse/RPL-2146",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-2146"
},
{
"name": "28558",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28558"
},
{
"name": "FEDORA-2008-0748",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html"
},
{
"name": "RHSA-2008:0089",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html"
},
{
"name": "28628",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28628"
},
{
"name": "28664",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28664"
},
{
"name": "DSA-1479",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1479"
},
{
"name": "RHSA-2008:0055",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0055.html"
},
{
"name": "USN-574-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-574-1"
},
{
"name": "28626",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28626"
},
{
"name": "28748",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28748"
},
{
"name": "SUSE-SA:2008:006",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"name": "28706",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28706"
},
{
"name": "1019289",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1019289"
},
{
"name": "28806",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28806"
},
{
"name": "MDVSA-2008:044",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "USN-578-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-578-1"
},
{
"name": "28971",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28971"
},
{
"name": "SUSE-SA:2008:013",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "28643",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28643"
},
{
"name": "29245",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29245"
},
{
"name": "MDVSA-2008:112",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:112"
},
{
"name": "ADV-2008-0151",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0151"
},
{
"name": "linux-directory-security-bypass(39672)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39672"
},
{
"name": "oval:org.mitre.oval:def:9709",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709"
},
{
"name": "20080117 rPSA-2008-0021-1 kernel",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/486485/100/0/threaded"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:18Z",
"publishedDate": "2008-01-15T20:00Z"
}
}
}
RHSA-2008:0055
Vulnerability from csaf_redhat - Published: 2008-01-31 18:23 - Updated: 2026-01-13 22:11The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and a bug in the\nRed Hat Enterprise Linux 4 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated kernel packages fix the following security issues:\n\nA flaw was found in the virtual filesystem (VFS). A local unprivileged\nuser could truncate directories to which they had write permission; this\ncould render the contents of the directory inaccessible. (CVE-2008-0001,\nImportant)\n\nA flaw was found in the implementation of ptrace. A local unprivileged user\ncould trigger this flaw and possibly cause a denial of service (system\nhang). (CVE-2007-5500, Important)\n\nA flaw was found in the way the Red Hat Enterprise Linux 4 kernel handled\npage faults when a CPU used the NUMA method for accessing memory on Itanium\narchitectures. A local unprivileged user could trigger this flaw and cause\na denial of service (system panic). (CVE-2007-4130, Important)\n\nA possible NULL pointer dereference was found in the chrp_show_cpuinfo\nfunction when using the PowerPC architecture. This may have allowed a local\nunprivileged user to cause a denial of service (crash).\n(CVE-2007-6694, Moderate)\n\nA flaw was found in the way core dump files were created. If a local user\ncan get a root-owned process to dump a core file into a directory, which\nthe user has write access to, they could gain read access to that core\nfile. This could potentially grant unauthorized access to sensitive\ninformation. (CVE-2007-6206, Moderate)\n\nTwo buffer overflow flaws were found in the Linux kernel ISDN subsystem. A\nlocal unprivileged user could use these flaws to cause a denial of\nservice. (CVE-2007-6063, CVE-2007-6151, Moderate)\n\nAs well, these updated packages fix the following bug:\n\n* when moving volumes that contain multiple segments, and a mirror segment\nis not the first in the mapping table, running the \"pvmove /dev/[device]\n/dev/[device]\" command caused a kernel panic. A \"kernel: Unable to handle\nkernel paging request at virtual address [address]\" error was logged by\nsyslog.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0055",
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "179665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=179665"
},
{
"category": "external",
"summary": "382161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=382161"
},
{
"category": "external",
"summary": "392101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101"
},
{
"category": "external",
"summary": "396751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751"
},
{
"category": "external",
"summary": "396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "425111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425111"
},
{
"category": "external",
"summary": "428637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428637"
},
{
"category": "external",
"summary": "428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0055.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2026-01-13T22:11:41+00:00",
"generator": {
"date": "2026-01-13T22:11:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2008:0055",
"initial_release_date": "2008-01-31T18:23:00+00:00",
"revision_history": [
{
"date": "2008-01-31T18:23:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-31T13:35:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:11:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-67.0.4.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.src",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.src",
"product_id": "kernel-0:2.6.9-67.0.4.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-67.0.4.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x",
"product_id": "kernel-0:2.6.9-67.0.4.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.s390",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390",
"product_id": "kernel-0:2.6.9-67.0.4.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-4130",
"discovery_date": "2007-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "179665"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "panic caused by set_mempolicy with MPOL_BIND",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4130"
},
{
"category": "external",
"summary": "RHBZ#179665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=179665"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4130",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4130"
}
],
"release_date": "2006-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "panic caused by set_mempolicy with MPOL_BIND"
},
{
"cve": "CVE-2007-5500",
"discovery_date": "2007-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "382161"
}
],
"notes": [
{
"category": "description",
"text": "The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel hang via userspace PTRACE+waitid",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5500"
},
{
"category": "external",
"summary": "RHBZ#382161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=382161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5500",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5500"
}
],
"release_date": "2007-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel hang via userspace PTRACE+waitid"
},
{
"cve": "CVE-2007-6063",
"discovery_date": "2007-11-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "392101"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux Kernel isdn_net_setcfg buffer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6063"
},
{
"category": "external",
"summary": "RHBZ#392101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6063",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063"
}
],
"release_date": "2007-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Linux Kernel isdn_net_setcfg buffer overflow"
},
{
"cve": "CVE-2007-6151",
"discovery_date": "2007-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "425111"
}
],
"notes": [
{
"category": "description",
"text": "The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "I4L: fix isdn_ioctl memory issue",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6151"
},
{
"category": "external",
"summary": "RHBZ#425111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6151"
}
],
"release_date": "2007-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "I4L: fix isdn_ioctl memory issue"
},
{
"cve": "CVE-2007-6206",
"discovery_date": "2004-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "396861"
}
],
"notes": [
{
"category": "description",
"text": "The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Issue with core dump owner",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6206"
},
{
"category": "external",
"summary": "RHBZ#396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6206",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206"
}
],
"release_date": "2004-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Issue with core dump owner"
},
{
"cve": "CVE-2007-6694",
"discovery_date": "2007-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "396751"
}
],
"notes": [
{
"category": "description",
"text": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "/proc/cpuinfo DoS on some ppc machines",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6694"
},
{
"category": "external",
"summary": "RHBZ#396751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6694",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6694"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694"
}
],
"release_date": "2007-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "/proc/cpuinfo DoS on some ppc machines"
},
{
"cve": "CVE-2008-0001",
"discovery_date": "2008-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428791"
}
],
"notes": [
{
"category": "description",
"text": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filesystem corruption by unprivileged user via directory truncation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0001"
},
{
"category": "external",
"summary": "RHBZ#428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001"
}
],
"release_date": "2008-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: filesystem corruption by unprivileged user via directory truncation"
}
]
}
RHSA-2008:0089
Vulnerability from csaf_redhat - Published: 2008-01-23 15:07 - Updated: 2025-11-21 17:32The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nin the Red Hat Enterprise Linux 5 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese new kernel packages fix the following security issues:\n\nA flaw was found in the virtual filesystem (VFS). An unprivileged local\nuser could truncate directories to which they had write permission; this\ncould render the contents of the directory inaccessible. (CVE-2008-0001,\nImportant)\n\nA flaw was found in the Xen PAL emulation on Intel 64 platforms. A guest\nHardware-assisted virtual machine (HVM) could read the arbitrary physical\nmemory of the host system, which could make information available to\nunauthorized users. (CVE-2007-6416, Important)\n\nA flaw was found in the way core dump files were created. If a local user\ncan get a root-owned process to dump a core file into a directory, which\nthe user has write access to, they could gain read access to that core\nfile, potentially containing sensitive information. (CVE-2007-6206, Moderate)\n\nA buffer overflow flaw was found in the CIFS virtual file system. A\nremote,authenticated user could issue a request that could lead to a denial\nof service. (CVE-2007-5904, Moderate)\n\nA flaw was found in the \"sysfs_readdir\" function. A local user could create\na race condition which would cause a denial of service (kernel oops).\n(CVE-2007-3104, Moderate)\n\nAs well, these updated packages fix the following bugs:\n\n* running the \"strace -f\" command caused strace to hang, without displaying\ninformation about child processes.\n\n* unmounting an unresponsive, interruptable NFS mount, for example, one\nmounted with the \"intr\" option, may have caused a system crash.\n\n* a bug in the s2io.ko driver prevented VLAN devices from being added.\nAttempting to add a device to a VLAN, for example, running the \"vconfig\nadd [device-name] [vlan-id]\" command caused vconfig to fail.\n\n* tux used an incorrect open flag bit. This caused problems when building\npackages in a chroot environment, such as mock, which is used by the koji\nbuild system.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0089",
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "245777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245777"
},
{
"category": "external",
"summary": "372701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701"
},
{
"category": "external",
"summary": "396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "412091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=412091"
},
{
"category": "external",
"summary": "414041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=414041"
},
{
"category": "external",
"summary": "424181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=424181"
},
{
"category": "external",
"summary": "425381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425381"
},
{
"category": "external",
"summary": "426289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=426289"
},
{
"category": "external",
"summary": "427994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994"
},
{
"category": "external",
"summary": "428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0089.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:32:53+00:00",
"generator": {
"date": "2025-11-21T17:32:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0089",
"initial_release_date": "2008-01-23T15:07:00+00:00",
"revision_history": [
{
"date": "2008-01-23T15:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-23T10:07:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.6.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.src",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.src",
"product_id": "kernel-0:2.6.18-53.1.6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.6.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3104",
"discovery_date": "2007-04-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427994"
}
],
"notes": [
{
"category": "description",
"text": "The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3104"
},
{
"category": "external",
"summary": "RHBZ#427994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104"
}
],
"release_date": "2007-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir"
},
{
"cve": "CVE-2007-5904",
"discovery_date": "2007-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "372701"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Buffer overflow in CIFS VFS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5904"
},
{
"category": "external",
"summary": "RHBZ#372701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5904",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904"
}
],
"release_date": "2007-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Buffer overflow in CIFS VFS"
},
{
"cve": "CVE-2007-6206",
"discovery_date": "2004-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "396861"
}
],
"notes": [
{
"category": "description",
"text": "The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Issue with core dump owner",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6206"
},
{
"category": "external",
"summary": "RHBZ#396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6206",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206"
}
],
"release_date": "2004-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Issue with core dump owner"
},
{
"cve": "CVE-2007-6416",
"discovery_date": "2007-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "425381"
}
],
"notes": [
{
"category": "description",
"text": "The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Security: vulnerability of copy_to_user in PAL emulation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6416"
},
{
"category": "external",
"summary": "RHBZ#425381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6416",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6416"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6416",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6416"
}
],
"release_date": "2007-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Security: vulnerability of copy_to_user in PAL emulation"
},
{
"cve": "CVE-2008-0001",
"discovery_date": "2008-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428791"
}
],
"notes": [
{
"category": "description",
"text": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filesystem corruption by unprivileged user via directory truncation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0001"
},
{
"category": "external",
"summary": "RHBZ#428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001"
}
],
"release_date": "2008-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: filesystem corruption by unprivileged user via directory truncation"
}
]
}
RHSA-2008_0055
Vulnerability from csaf_redhat - Published: 2008-01-31 18:23 - Updated: 2024-11-22 02:21The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and a bug in the\nRed Hat Enterprise Linux 4 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated kernel packages fix the following security issues:\n\nA flaw was found in the virtual filesystem (VFS). A local unprivileged\nuser could truncate directories to which they had write permission; this\ncould render the contents of the directory inaccessible. (CVE-2008-0001,\nImportant)\n\nA flaw was found in the implementation of ptrace. A local unprivileged user\ncould trigger this flaw and possibly cause a denial of service (system\nhang). (CVE-2007-5500, Important)\n\nA flaw was found in the way the Red Hat Enterprise Linux 4 kernel handled\npage faults when a CPU used the NUMA method for accessing memory on Itanium\narchitectures. A local unprivileged user could trigger this flaw and cause\na denial of service (system panic). (CVE-2007-4130, Important)\n\nA possible NULL pointer dereference was found in the chrp_show_cpuinfo\nfunction when using the PowerPC architecture. This may have allowed a local\nunprivileged user to cause a denial of service (crash).\n(CVE-2007-6694, Moderate)\n\nA flaw was found in the way core dump files were created. If a local user\ncan get a root-owned process to dump a core file into a directory, which\nthe user has write access to, they could gain read access to that core\nfile. This could potentially grant unauthorized access to sensitive\ninformation. (CVE-2007-6206, Moderate)\n\nTwo buffer overflow flaws were found in the Linux kernel ISDN subsystem. A\nlocal unprivileged user could use these flaws to cause a denial of\nservice. (CVE-2007-6063, CVE-2007-6151, Moderate)\n\nAs well, these updated packages fix the following bug:\n\n* when moving volumes that contain multiple segments, and a mirror segment\nis not the first in the mapping table, running the \"pvmove /dev/[device]\n/dev/[device]\" command caused a kernel panic. A \"kernel: Unable to handle\nkernel paging request at virtual address [address]\" error was logged by\nsyslog.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0055",
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "179665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=179665"
},
{
"category": "external",
"summary": "382161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=382161"
},
{
"category": "external",
"summary": "392101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101"
},
{
"category": "external",
"summary": "396751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751"
},
{
"category": "external",
"summary": "396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "425111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425111"
},
{
"category": "external",
"summary": "428637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428637"
},
{
"category": "external",
"summary": "428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0055.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T02:21:04+00:00",
"generator": {
"date": "2024-11-22T02:21:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0055",
"initial_release_date": "2008-01-31T18:23:00+00:00",
"revision_history": [
{
"date": "2008-01-31T18:23:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-31T13:35:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:21:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-67.0.4.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.src",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.src",
"product_id": "kernel-0:2.6.9-67.0.4.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-67.0.4.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.4.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x",
"product_id": "kernel-0:2.6.9-67.0.4.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-67.0.4.EL.s390",
"product": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390",
"product_id": "kernel-0:2.6.9-67.0.4.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.4.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"product_id": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.4.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.4.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.src"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-67.0.4.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-4130",
"discovery_date": "2007-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "179665"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "panic caused by set_mempolicy with MPOL_BIND",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4130"
},
{
"category": "external",
"summary": "RHBZ#179665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=179665"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4130",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4130"
}
],
"release_date": "2006-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "panic caused by set_mempolicy with MPOL_BIND"
},
{
"cve": "CVE-2007-5500",
"discovery_date": "2007-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "382161"
}
],
"notes": [
{
"category": "description",
"text": "The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel hang via userspace PTRACE+waitid",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5500"
},
{
"category": "external",
"summary": "RHBZ#382161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=382161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5500",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5500"
}
],
"release_date": "2007-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel hang via userspace PTRACE+waitid"
},
{
"cve": "CVE-2007-6063",
"discovery_date": "2007-11-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "392101"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Linux Kernel isdn_net_setcfg buffer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6063"
},
{
"category": "external",
"summary": "RHBZ#392101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=392101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6063",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6063"
}
],
"release_date": "2007-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Linux Kernel isdn_net_setcfg buffer overflow"
},
{
"cve": "CVE-2007-6151",
"discovery_date": "2007-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "425111"
}
],
"notes": [
{
"category": "description",
"text": "The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "I4L: fix isdn_ioctl memory issue",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6151"
},
{
"category": "external",
"summary": "RHBZ#425111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6151"
}
],
"release_date": "2007-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "I4L: fix isdn_ioctl memory issue"
},
{
"cve": "CVE-2007-6206",
"discovery_date": "2004-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "396861"
}
],
"notes": [
{
"category": "description",
"text": "The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Issue with core dump owner",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6206"
},
{
"category": "external",
"summary": "RHBZ#396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6206",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206"
}
],
"release_date": "2004-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Issue with core dump owner"
},
{
"cve": "CVE-2007-6694",
"discovery_date": "2007-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "396751"
}
],
"notes": [
{
"category": "description",
"text": "The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "/proc/cpuinfo DoS on some ppc machines",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6694"
},
{
"category": "external",
"summary": "RHBZ#396751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6694",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6694"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6694"
}
],
"release_date": "2007-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "/proc/cpuinfo DoS on some ppc machines"
},
{
"cve": "CVE-2008-0001",
"discovery_date": "2008-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428791"
}
],
"notes": [
{
"category": "description",
"text": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filesystem corruption by unprivileged user via directory truncation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0001"
},
{
"category": "external",
"summary": "RHBZ#428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001"
}
],
"release_date": "2008-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-31T18:23:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-0:2.6.9-67.0.4.EL.src",
"4AS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4AS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.src",
"4Desktop:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-0:2.6.9-67.0.4.EL.src",
"4ES:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4ES:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-0:2.6.9-67.0.4.EL.src",
"4WS:kernel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.s390x",
"4WS:kernel-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-67.0.4.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-0:2.6.9-67.0.4.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-67.0.4.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0055"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: filesystem corruption by unprivileged user via directory truncation"
}
]
}
RHSA-2008_0089
Vulnerability from csaf_redhat - Published: 2008-01-23 15:07 - Updated: 2024-11-22 02:11The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nin the Red Hat Enterprise Linux 5 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese new kernel packages fix the following security issues:\n\nA flaw was found in the virtual filesystem (VFS). An unprivileged local\nuser could truncate directories to which they had write permission; this\ncould render the contents of the directory inaccessible. (CVE-2008-0001,\nImportant)\n\nA flaw was found in the Xen PAL emulation on Intel 64 platforms. A guest\nHardware-assisted virtual machine (HVM) could read the arbitrary physical\nmemory of the host system, which could make information available to\nunauthorized users. (CVE-2007-6416, Important)\n\nA flaw was found in the way core dump files were created. If a local user\ncan get a root-owned process to dump a core file into a directory, which\nthe user has write access to, they could gain read access to that core\nfile, potentially containing sensitive information. (CVE-2007-6206, Moderate)\n\nA buffer overflow flaw was found in the CIFS virtual file system. A\nremote,authenticated user could issue a request that could lead to a denial\nof service. (CVE-2007-5904, Moderate)\n\nA flaw was found in the \"sysfs_readdir\" function. A local user could create\na race condition which would cause a denial of service (kernel oops).\n(CVE-2007-3104, Moderate)\n\nAs well, these updated packages fix the following bugs:\n\n* running the \"strace -f\" command caused strace to hang, without displaying\ninformation about child processes.\n\n* unmounting an unresponsive, interruptable NFS mount, for example, one\nmounted with the \"intr\" option, may have caused a system crash.\n\n* a bug in the s2io.ko driver prevented VLAN devices from being added.\nAttempting to add a device to a VLAN, for example, running the \"vconfig\nadd [device-name] [vlan-id]\" command caused vconfig to fail.\n\n* tux used an incorrect open flag bit. This caused problems when building\npackages in a chroot environment, such as mock, which is used by the koji\nbuild system.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0089",
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "245777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245777"
},
{
"category": "external",
"summary": "372701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701"
},
{
"category": "external",
"summary": "396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "412091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=412091"
},
{
"category": "external",
"summary": "414041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=414041"
},
{
"category": "external",
"summary": "424181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=424181"
},
{
"category": "external",
"summary": "425381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425381"
},
{
"category": "external",
"summary": "426289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=426289"
},
{
"category": "external",
"summary": "427994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994"
},
{
"category": "external",
"summary": "428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0089.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T02:11:08+00:00",
"generator": {
"date": "2024-11-22T02:11:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0089",
"initial_release_date": "2008-01-23T15:07:00+00:00",
"revision_history": [
{
"date": "2008-01-23T15:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-23T10:07:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:11:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"product_id": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.6.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.src",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.src",
"product_id": "kernel-0:2.6.18-53.1.6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.6.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3104",
"discovery_date": "2007-04-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427994"
}
],
"notes": [
{
"category": "description",
"text": "The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3104"
},
{
"category": "external",
"summary": "RHBZ#427994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104"
}
],
"release_date": "2007-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir"
},
{
"cve": "CVE-2007-5904",
"discovery_date": "2007-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "372701"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Buffer overflow in CIFS VFS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5904"
},
{
"category": "external",
"summary": "RHBZ#372701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5904",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904"
}
],
"release_date": "2007-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Buffer overflow in CIFS VFS"
},
{
"cve": "CVE-2007-6206",
"discovery_date": "2004-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "396861"
}
],
"notes": [
{
"category": "description",
"text": "The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Issue with core dump owner",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6206"
},
{
"category": "external",
"summary": "RHBZ#396861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6206",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206"
}
],
"release_date": "2004-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Issue with core dump owner"
},
{
"cve": "CVE-2007-6416",
"discovery_date": "2007-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "425381"
}
],
"notes": [
{
"category": "description",
"text": "The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Security: vulnerability of copy_to_user in PAL emulation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6416"
},
{
"category": "external",
"summary": "RHBZ#425381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=425381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6416",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6416"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6416",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6416"
}
],
"release_date": "2007-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Security: vulnerability of copy_to_user in PAL emulation"
},
{
"cve": "CVE-2008-0001",
"discovery_date": "2008-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "428791"
}
],
"notes": [
{
"category": "description",
"text": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filesystem corruption by unprivileged user via directory truncation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0001"
},
{
"category": "external",
"summary": "RHBZ#428791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001"
}
],
"release_date": "2008-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-01-23T15:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.6.el5.src",
"5Client:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.6.el5.src",
"5Server:kernel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0089"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: filesystem corruption by unprivileged user via directory truncation"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.