Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-3833
Vulnerability from cvelistv5
Published
2008-10-03 17:18
Modified
2024-08-07 09:53
Severity ?
EPSS score ?
Summary
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:53:00.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32485" }, { "name": "32237", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32237" }, { "name": "[oss-security] 20081003 CVE-2008-3833 kernel: remove SUID when splicing into an inode", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2008/10/03/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" }, { "name": "RHSA-2008:0957", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html" }, { "name": "kernel-genericfilesplice-priv-escalation(45922)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45922" }, { "name": "DSA-1653", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1653" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3" }, { "name": "32759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32759" }, { "name": "oval:org.mitre.oval:def:9980", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3" }, { "name": "SUSE-SR:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "31567", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31567" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "32485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32485" }, { "name": "32237", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32237" }, { "name": "[oss-security] 20081003 CVE-2008-3833 kernel: remove SUID when splicing into an inode", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2008/10/03/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" }, { "name": "RHSA-2008:0957", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html" }, { "name": "kernel-genericfilesplice-priv-escalation(45922)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45922" }, { "name": "DSA-1653", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1653" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3" }, { "name": "32759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32759" }, { "name": "oval:org.mitre.oval:def:9980", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3" }, { "name": "SUSE-SR:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "31567", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31567" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-3833", "datePublished": "2008-10-03T17:18:00", "dateReserved": "2008-08-27T00:00:00", "dateUpdated": "2024-08-07T09:53:00.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-3833\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-10-03T17:41:40.400\",\"lastModified\":\"2024-11-21T00:50:13.640\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n generic_file_splice_write de fs/splice.c en Linux kernel versiones anteriores a v2.6.19 no lanza correctamente bits setuid y setgid cuando hay una escritura a un fichero, lo cual permite a usuarios locales conseguir privilegios de un grupo diferente, y obtener informaci\u00f3n sensible o posiblemente tener otros impactos desconocidos, por la uni\u00f3n en un inodo con el fin de crear un archivo ejecutable en un directorio setgid, una vulnerabilidad diferente a CVE-2008-4210.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:N/A:N\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.26.4\",\"matchCriteriaId\":\"BC4F5B5A-0545-4238-BF3A-F6458C977992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F9DBB0-8AF7-42CA-95DD-68A344E9D549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA39D4CE-22F0-46A2-B8CF-4599675E7D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD00664-A27C-4514-A2A4-079E8F9B0251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E336C792-B7A1-4318-8050-DE9F03474CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7228AE50-BACB-4AB8-9CE5-17DB0CD661AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D260FD-E55E-4A95-AB7F-B880DBE37BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D0159-1A05-4628-9C1C-360DED0F438C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6654B9-42EB-4C2C-8F71-710D50556180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034DFD7F-8919-4245-8480-7B272F591271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FDF616-E410-4540-B377-98D1FB88CE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5313B736-9904-442A-84D6-8FC7B9AC2059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA56669-B09E-42C2-9591-245C46909A2F\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2008/10/03/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32237\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32759\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1653\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0957.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/31567\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=464450\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45922\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2008/10/03/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0957.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/31567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=464450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.\\n\\nIt was addressed in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2008-0957.html\",\"lastModified\":\"2009-01-15T00:00:00\"}]}}" } }
gsd-2008-3833
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-3833", "description": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.", "id": "GSD-2008-3833", "references": [ "https://www.suse.com/security/cve/CVE-2008-3833.html", "https://www.debian.org/security/2008/dsa-1653", "https://access.redhat.com/errata/RHSA-2008:0957", "https://linux.oracle.com/cve/CVE-2008-3833.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-3833" ], "details": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.", "id": "GSD-2008-3833", "modified": "2023-12-13T01:23:04.996742Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-3833", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "http://secunia.com/advisories/32759", "refsource": "MISC", "url": "http://secunia.com/advisories/32759" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3" }, { "name": "http://openwall.com/lists/oss-security/2008/10/03/1", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2008/10/03/1" }, { "name": "http://secunia.com/advisories/32237", "refsource": "MISC", "url": "http://secunia.com/advisories/32237" }, { "name": "http://secunia.com/advisories/32485", "refsource": "MISC", "url": "http://secunia.com/advisories/32485" }, { "name": "http://www.debian.org/security/2008/dsa-1653", "refsource": "MISC", "url": "http://www.debian.org/security/2008/dsa-1653" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0957.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html" }, { "name": "http://www.securityfocus.com/bid/31567", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/31567" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45922", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45922" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=464450", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.26.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-3833" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=464450", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" }, { "name": "[oss-security] 20081003 CVE-2008-3833 kernel: remove SUID when splicing into an inode", "refsource": "MLIST", "tags": [], "url": "http://openwall.com/lists/oss-security/2008/10/03/1" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3", "refsource": "CONFIRM", "tags": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3" }, { "name": "31567", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/31567" }, { "name": "RHSA-2008:0957", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html" }, { "name": "32485", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32485" }, { "name": "SUSE-SR:2008:025", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "32759", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32759" }, { "name": "DSA-1653", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1653" }, { "name": "32237", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32237" }, { "name": "kernel-genericfilesplice-priv-escalation(45922)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45922" }, { "name": "oval:org.mitre.oval:def:9980", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:19Z", "publishedDate": "2008-10-03T17:41Z" } } }
ghsa-qwxw-cr32-mppw
Vulnerability from github
Published
2022-05-02 00:04
Modified
2022-05-02 00:04
Details
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
{ "affected": [], "aliases": [ "CVE-2008-3833" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-10-03T17:41:00Z", "severity": "MODERATE" }, "details": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.", "id": "GHSA-qwxw-cr32-mppw", "modified": "2022-05-02T00:04:14Z", "published": "2022-05-02T00:04:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45922" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git;a=commit;h=8c34e2d63231d4bf4852bac8521883944d770fe3" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2008/10/03/1" }, { "type": "WEB", "url": "http://secunia.com/advisories/32237" }, { "type": "WEB", "url": "http://secunia.com/advisories/32485" }, { "type": "WEB", "url": "http://secunia.com/advisories/32759" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1653" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/31567" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2008_0957
Vulnerability from csaf_redhat
Published
2008-11-04 10:11
Modified
2024-11-22 02:21
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
[Updated 12th November 2008]
The original packages distributed with this errata had a bug which
prevented the Xen kernel booting on older hardware. We have updated the
packages to correct this bug.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
* the Xen implementation did not prevent applications running in a
para-virtualized guest from modifying CR4 TSC. This could cause a local
denial of service. (CVE-2007-5907, Important)
* Tavis Ormandy reported missing boundary checks in the Virtual Dynamic
Shared Objects (vDSO) implementation. This could allow a local unprivileged
user to cause a denial of service or escalate privileges. (CVE-2008-3527,
Important)
* the do_truncate() and generic_file_splice_write() functions did not clear
the setuid and setgid bits. This could allow a local unprivileged user to
obtain access to privileged information. (CVE-2008-4210, CVE-2008-3833,
Important)
* a flaw was found in the Linux kernel splice implementation. This could
cause a local denial of service when there is a certain failure in the
add_to_page_cache_lru() function. (CVE-2008-4302, Important)
* a flaw was found in the Linux kernel when running on AMD64 systems.
During a context switch, EFLAGS were being neither saved nor restored. This
could allow a local unprivileged user to cause a denial of service.
(CVE-2006-5755, Low)
* a flaw was found in the Linux kernel virtual memory implementation. This
could allow a local unprivileged user to cause a denial of service.
(CVE-2008-2372, Low)
* an integer overflow was discovered in the Linux kernel Datagram
Congestion Control Protocol (DCCP) implementation. This could allow a
remote attacker to cause a denial of service. By default, remote DCCP is
blocked by SELinux. (CVE-2008-3276, Low)
In addition, these updated packages fix the following bugs:
* random32() seeding has been improved.
* in a multi-core environment, a race between the QP async event-handler
and the destro_qp() function could occur. This led to unpredictable results
during invalid memory access, which could lead to a kernel crash.
* a format string was omitted in the call to the request_module() function.
* a stack overflow caused by an infinite recursion bug in the binfmt_misc
kernel module was corrected.
* the ata_scsi_rbuf_get() and ata_scsi_rbuf_put() functions now check for
scatterlist usage before calling kmap_atomic().
* a sentinel NUL byte was added to the device_write() function to ensure
that lspace.name is NUL-terminated.
* in the character device driver, a range_is_allowed() check was added to
the read_mem() and write_mem() functions. It was possible for an
illegitimate application to bypass these checks, and access /dev/mem beyond
the 1M limit by calling mmap_mem() instead. Also, the parameters of
range_is_allowed() were changed to cleanly handle greater than 32-bits of
physical address on 32-bit architectures.
* some of the newer Nehalem-based systems declare their CPU DSDT entries as
type "Alias". During boot, this caused an "Error attaching device data"
message to be logged.
* the evtchn event channel device lacked locks and memory barriers. This
has led to xenstore becoming unresponsive on the Itanium® architecture.
* sending of gratuitous ARP packets in the Xen frontend network driver is
now delayed until the backend signals that its carrier status has been
processed by the stack.
* on forcedeth devices, whenever setting ethtool parameters for link speed,
the device could stop receiving interrupts.
* the CIFS 'forcedirectio' option did not allow text to be appended to files.
* the gettimeofday() function returned a backwards time on Intel® 64.
* residual-count corrections during UNDERRUN handling were added to the
qla2xxx driver.
* the fix for a small quirk was removed for certain Adaptec controllers for
which it caused problems.
* the "xm trigger init" command caused a domain panic if a userland
application was running on a guest on the Intel® 64 architecture.
Users of kernel should upgrade to these updated packages, which contain
backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that resolve several security issues and fix\nvarious bugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 12th November 2008]\nThe original packages distributed with this errata had a bug which\nprevented the Xen kernel booting on older hardware. We have updated the\npackages to correct this bug.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* the Xen implementation did not prevent applications running in a\npara-virtualized guest from modifying CR4 TSC. This could cause a local\ndenial of service. (CVE-2007-5907, Important)\n\n* Tavis Ormandy reported missing boundary checks in the Virtual Dynamic\nShared Objects (vDSO) implementation. This could allow a local unprivileged\nuser to cause a denial of service or escalate privileges. (CVE-2008-3527,\nImportant)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, CVE-2008-3833,\nImportant)\n\n* a flaw was found in the Linux kernel splice implementation. This could\ncause a local denial of service when there is a certain failure in the\nadd_to_page_cache_lru() function. (CVE-2008-4302, Important)\n\n* a flaw was found in the Linux kernel when running on AMD64 systems.\nDuring a context switch, EFLAGS were being neither saved nor restored. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2006-5755, Low)\n\n* a flaw was found in the Linux kernel virtual memory implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2008-2372, Low)\n\n* an integer overflow was discovered in the Linux kernel Datagram\nCongestion Control Protocol (DCCP) implementation. This could allow a\nremote attacker to cause a denial of service. By default, remote DCCP is\nblocked by SELinux. (CVE-2008-3276, Low)\n\nIn addition, these updated packages fix the following bugs:\n\n* random32() seeding has been improved. \n\n* in a multi-core environment, a race between the QP async event-handler\nand the destro_qp() function could occur. This led to unpredictable results\nduring invalid memory access, which could lead to a kernel crash.\n\n* a format string was omitted in the call to the request_module() function.\n\n* a stack overflow caused by an infinite recursion bug in the binfmt_misc\nkernel module was corrected.\n\n* the ata_scsi_rbuf_get() and ata_scsi_rbuf_put() functions now check for\nscatterlist usage before calling kmap_atomic().\n\n* a sentinel NUL byte was added to the device_write() function to ensure\nthat lspace.name is NUL-terminated.\n\n* in the character device driver, a range_is_allowed() check was added to\nthe read_mem() and write_mem() functions. It was possible for an\nillegitimate application to bypass these checks, and access /dev/mem beyond\nthe 1M limit by calling mmap_mem() instead. Also, the parameters of\nrange_is_allowed() were changed to cleanly handle greater than 32-bits of\nphysical address on 32-bit architectures.\n\n* some of the newer Nehalem-based systems declare their CPU DSDT entries as\ntype \"Alias\". During boot, this caused an \"Error attaching device data\"\nmessage to be logged.\n\n* the evtchn event channel device lacked locks and memory barriers. This\nhas led to xenstore becoming unresponsive on the Itanium\u00ae architecture.\n\n* sending of gratuitous ARP packets in the Xen frontend network driver is\nnow delayed until the backend signals that its carrier status has been\nprocessed by the stack.\n\n* on forcedeth devices, whenever setting ethtool parameters for link speed,\nthe device could stop receiving interrupts.\n\n* the CIFS \u0027forcedirectio\u0027 option did not allow text to be appended to files.\n\n* the gettimeofday() function returned a backwards time on Intel\u00ae 64.\n\n* residual-count corrections during UNDERRUN handling were added to the\nqla2xxx driver. \n\n* the fix for a small quirk was removed for certain Adaptec controllers for\nwhich it caused problems.\n\n* the \"xm trigger init\" command caused a domain panic if a userland\napplication was running on a guest on the Intel\u00ae 64 architecture.\n\nUsers of kernel should upgrade to these updated packages, which contain\nbackported patches to correct these issues. ", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0957", "url": "https://access.redhat.com/errata/RHSA-2008:0957" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "377561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=377561" }, { "category": "external", "summary": "452666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666" }, { "category": "external", "summary": "457718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457718" }, { "category": "external", "summary": "458021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458021" }, { "category": "external", "summary": "458759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458759" }, { "category": "external", "summary": "458781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458781" }, { "category": "external", "summary": "459226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226" }, { "category": "external", "summary": "459461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=459461" }, { "category": "external", "summary": "459464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=459464" }, { "category": "external", "summary": "460251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460251" }, { "category": "external", "summary": "460638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460638" }, { "category": "external", "summary": "460858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460858" }, { "category": "external", "summary": "460868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460868" }, { "category": "external", "summary": "461099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461099" }, { "category": "external", "summary": "461457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461457" }, { "category": "external", "summary": "461894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461894" }, { "category": "external", "summary": "462434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=462434" }, { "category": "external", "summary": "462591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=462591" }, { "category": "external", "summary": "462860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=462860" }, { "category": "external", "summary": "463661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463661" }, { "category": "external", "summary": "464450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" }, { "category": "external", "summary": "465741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=465741" }, { "category": "external", "summary": "466427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=466427" }, { "category": "external", "summary": "466885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=466885" }, { "category": "external", "summary": "467105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=467105" }, { "category": "external", "summary": "470040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470040" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0957.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:21:23+00:00", "generator": { "date": "2024-11-22T02:21:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0957", "initial_release_date": "2008-11-04T10:11:00+00:00", "revision_history": [ { "date": "2008-11-04T10:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-11-12T04:34:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:21:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-devel-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-xen-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-PAE-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.18.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.18.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.i686", "product_id": "kernel-debug-0:2.6.18-92.1.18.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.18.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.i386", "product_id": "kernel-headers-0:2.6.18-92.1.18.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.1.18.el5.src", "product": { "name": "kernel-0:2.6.18-92.1.18.el5.src", "product_id": "kernel-0:2.6.18-92.1.18.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch", "product_id": "kernel-doc-0:2.6.18-92.1.18.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.18.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-devel-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-xen-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.18.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64", "product_id": "kernel-debug-0:2.6.18-92.1.18.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.18.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc", "product_id": "kernel-headers-0:2.6.18-92.1.18.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-devel-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-headers-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-debug-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.18.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.18.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.src" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.1.18.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.src" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.1.18.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.1.18.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-5755", "discovery_date": "2006-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "457718" } ], "notes": [ { "category": "description", "text": "Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local denial of service due to NT bit leakage", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5755" }, { "category": "external", "summary": "RHBZ#457718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5755", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5755" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5755", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5755" } ], "release_date": "2006-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: local denial of service due to NT bit leakage" }, { "cve": "CVE-2007-5907", "discovery_date": "2007-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "377561" } ], "notes": [ { "category": "description", "text": "Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5907" }, { "category": "external", "summary": "RHBZ#377561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=377561" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5907", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5907" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5907", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5907" } ], "release_date": "2007-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)" }, { "cve": "CVE-2008-2372", "discovery_date": "2008-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "452666" } ], "notes": [ { "category": "description", "text": "The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of \"useless newly zeroed pages.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reinstate ZERO_PAGE optimization in \u0027get_user_pages()\u0027 and fix XIP", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2372" }, { "category": "external", "summary": "RHBZ#452666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2372", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2372" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372" } ], "release_date": "2008-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Reinstate ZERO_PAGE optimization in \u0027get_user_pages()\u0027 and fix XIP" }, { "cve": "CVE-2008-3276", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "459226" } ], "notes": [ { "category": "description", "text": "Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.", "title": "Vulnerability description" }, { "category": "summary", "text": "Linux kernel dccp_setsockopt_change() integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3276" }, { "category": "external", "summary": "RHBZ#459226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=459226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3276", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3276" } ], "release_date": "2008-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Linux kernel dccp_setsockopt_change() integer overflow" }, { "cve": "CVE-2008-3527", "discovery_date": "2008-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "460251" } ], "notes": [ { "category": "description", "text": "arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: missing boundary checks in syscall/syscall32_nopage()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3527" }, { "category": "external", "summary": "RHBZ#460251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3527", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3527" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3527", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3527" } ], "release_date": "2008-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: missing boundary checks in syscall/syscall32_nopage()" }, { "cve": "CVE-2008-3833", "discovery_date": "2008-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "464450" } ], "notes": [ { "category": "description", "text": "The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remove SUID when splicing into an inode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3833" }, { "category": "external", "summary": "RHBZ#464450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464450" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3833", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3833" } ], "release_date": "2006-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remove SUID when splicing into an inode" }, { "cve": "CVE-2008-4210", "discovery_date": "2008-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "463661" } ], "notes": [ { "category": "description", "text": "fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: open() call allows setgid bit when user is not in new file\u0027s group", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-4210" }, { "category": "external", "summary": "RHBZ#463661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463661" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4210", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4210" } ], "release_date": "2007-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: open() call allows setgid bit when user is not in new file\u0027s group" }, { "cve": "CVE-2008-4302", "discovery_date": "2008-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "462434" } ], "notes": [ { "category": "description", "text": "fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: splice: fix bad unlock_page() in error case", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-4302" }, { "category": "external", "summary": "RHBZ#462434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=462434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4302", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4302" } ], "release_date": "2007-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-04T10:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-0:2.6.18-92.1.18.el5.src", "5Client:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-0:2.6.18-92.1.18.el5.src", "5Server:kernel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.1.18.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.i386", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.1.18.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.1.18.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.1.18.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0957" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: splice: fix bad unlock_page() in error case" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.