Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2407 (GCVE-0-2009-2407)
Vulnerability from cvelistv5 – Published: 2009-07-31 18:29 – Updated: 2024-08-07 05:52- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:52:14.694Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "35985",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35985"
},
{
"name": "36131",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36131"
},
{
"name": "37471",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37471"
},
{
"name": "FEDORA-2009-8144",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
},
{
"name": "DSA-1844",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "USN-807-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "RHSA-2009:1193",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"name": "SUSE-SR:2009:015",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"name": "FEDORA-2009-8264",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "36051",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36051"
},
{
"name": "35850",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35850"
},
{
"name": "oval:org.mitre.oval:def:11255",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"name": "36045",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36045"
},
{
"name": "36116",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36116"
},
{
"name": "oval:org.mitre.oval:def:8057",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
},
{
"name": "36054",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36054"
},
{
"name": "ADV-2009-2041",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"name": "DSA-1845",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-07-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "35985",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35985"
},
{
"name": "36131",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36131"
},
{
"name": "37471",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37471"
},
{
"name": "FEDORA-2009-8144",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
},
{
"name": "DSA-1844",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "USN-807-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "RHSA-2009:1193",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"name": "SUSE-SR:2009:015",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"name": "FEDORA-2009-8264",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "36051",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36051"
},
{
"name": "35850",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35850"
},
{
"name": "oval:org.mitre.oval:def:11255",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"name": "36045",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36045"
},
{
"name": "36116",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36116"
},
{
"name": "oval:org.mitre.oval:def:8057",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
},
{
"name": "36054",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36054"
},
{
"name": "ADV-2009-2041",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"name": "DSA-1845",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-2407",
"datePublished": "2009-07-31T18:29:00.000Z",
"dateReserved": "2009-07-09T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:52:14.694Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2009-2407",
"date": "2026-05-17",
"epss": "0.00281",
"percentile": "0.51549"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6.30.3\", \"matchCriteriaId\": \"35E762F1-57F3-4E5D-938D-F966F4F5EDB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5301E27-8021-467C-A9A2-AF2137EF0299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79787868-2D77-4B55-AD61-C2B357CCE047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455E647F-73DD-400A-AA19-3D93FE2E57AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DE32C2-5B07-4812-9F88-000F5FB000C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936B7EE-9CD1-4698-AD67-C619D0171A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25379B32-D898-4E44-A740-978A129B5E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90F8F2-9549-413D-9676-3EF634D832B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BEE46-088A-494E-8E18-03F33F6BBEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF35478-B292-4A00-B985-CEEDE8B212C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7344B707-6145-48BA-8BC9-9B140A260BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B753112-CCDE-4870-AA97-4AAA2946421A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B3AFE7-F4FF-4144-9046-E5926E305A03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7616E197-ACCA-4191-A513-FD48417C7F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE2F94D-E8E0-4BB7-A910-378012580025\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F5AE3B-B701-4579-B44A-0F7A4267852E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E452E4-45A9-4469-BF69-F40B6598F0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48777A01-8F36-4752-8F7A-1D1686C69A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747F1324-AEFA-496F-9447-12CD13114F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795C3B17-687E-4F33-AA99-8FEC16F14693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900D6742-DE0F-45C5-A812-BF84088CB02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D88ED3C4-64C5-44B2-9F23-E16087046C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FB31E5-190C-489A-AB30-910D2CC854F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6316369-B54A-4E59-A022-E0610353B284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073C3CE0-E12D-4545-8460-5A1514271D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83700989-8820-48DA-A9FE-6A77DF1E8439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F4CEC-7781-468B-B460-4F487B7C6601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C75A62-8807-4821-9362-1E0D63C0A1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9960640-F02D-4E81-A34B-1893D8FD7F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C398D26-7132-4A6E-9003-77246644451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B21D90E-5172-485E-87AC-F1681604AD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641EECFD-A985-4026-A53A-10FBE47EAD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47595F81-2083-4236-A0B0-E2B98DD78402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F5FC758-5A5D-466A-8386-5FC469F79F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12547B6B-78F1-4426-81CE-5F208794658C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38429E64-276B-46D4-AACD-05349D6F6615\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E89640F8-313B-4A36-A591-36645D1EF838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B42F06-AC6D-40F3-BC03-5126BED48F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8002C7-19E2-4F20-890E-4BA2029174D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53037B40-D534-41D1-9895-8EDB0D884C3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549096F-C640-463E-AD07-FD8D254CC098\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8DCAF19-879C-42BB-B56A-84504E79758A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821BD11F-3C6A-4424-BC9B-DFD786248B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F55A024-9F8E-44F8-A0D8-696BC232524A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB759752-DC19-4750-838B-056063EFDC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99662904-E5E3-4E81-B199-39707EAEB652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"615BDD1D-36AA-4976-909B-F0F66BF1090C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B179CF1D-084D-4B21-956F-E55AC6BDE026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"432CA976-6EFA-4D34-B5EA-CD772D067F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E476195-657E-416E-BC16-44A18B06A133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70460F6C-D6C0-4C1A-B13E-368705EAF223\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBFF148-3EDA-4216-910B-8930D8C443C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF566DA-0F04-48DA-AA40-565979C55328\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5990C6C2-2F66-4C4D-8224-74163865F410\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C23AD176-3B99-4593-BCBD-13C1E579A13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5140380C-71BD-464F-AE53-1814C2653056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18EC0A7-8616-4039-B98B-E1216E035B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22FB141B-FA2A-435D-8937-83FC0669CB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FC6CE2-8717-4558-A309-A441D322F00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311BE336-7BB2-47C0-AED5-3DEA706C206F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AAC2E9D-0E82-4866-9046-ADD448418198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F9887E-2466-4C73-A8E1-2117492F9EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"815B2EE8-136F-44E4-997D-5F93A54775DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52152F5A-1833-4490-A373-9C547B90B0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64A095E-5E97-445E-B435-F09983CC0E7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE92406-DBF3-463E-8A51-F9679E851FDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C60D19B-ED9B-443C-9D49-002ABD381119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"264C61EE-64F6-43AD-B54F-7D683C29E64F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85064FDF-4B62-43BF-B36C-F659D739BC22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45B6847C-873B-4BE1-852D-239115E59BA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF41209E-D27F-4642-A405-90E822A41897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97F59FD9-46E5-4F63-80A0-091AD44D1867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94C9D70D-A552-48D6-9497-EE07EB5649D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"192B4273-0935-4232-BBFD-A850855CAC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A16F2182-C489-4CA9-A56B-01463148D16F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEF91995-A084-422A-A544-30B0B4D75E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA56669-B09E-42C2-9591-245C46909A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D08D180-23F7-456F-98CA-26B53C678D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E3C363-49C9-4869-83B5-76C14100BFF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"856FE78A-29B5-4411-98A0-4B0281C17EB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11795F8E-7ACD-4597-9194-FC7241DCE057\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7954A701-1671-4080-B1E6-47E0208FD28C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63D06512-EAF0-48C6-98F0-066E63FF07EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75B48F1-623A-4B96-9E08-4AA2DE748490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E6EB7C3-D9AB-43E7-8B78-2C36AE920935\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0383E2A5-60EE-47F3-9DA8-BF75028D511F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8B0C229-2A79-47E0-856A-2AE0FF97B967\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB27B247-D6BF-49C4-B113-76C9A47B7DCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F94BA1B0-52B9-4303-9C41-3ACC3AC1945E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACBB194-1D24-464A-B79C-44B8127EAD52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E5F269-7711-447D-B798-0F5478E36299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0138807-6313-4A3F-AB5A-4B7D4A9BE287\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BA2227-F259-499D-BF50-5074B1E7DD3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78A896D0-032C-4467-9D57-E47E8C612704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D1D4C8F-8C09-4A49-AFFD-33093AE7A437\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A415FECF-89CC-4D71-B1BF-6A678D32599D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98F77E54-5F4A-4D47-8DE8-097B4BBC7944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"752148FC-1594-4108-AE0F-C5145B978454\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09546671-E75D-4F50-9D86-DFDDAC9DC5DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6964925C-4394-4E82-976B-770A99E74F1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E8C909E-02D7-4B29-AA68-897BD0200B7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26BD805F-08EB-42EC-BC54-26A7278E5089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"217715A5-E69D-45C0-B8E4-5681528C651B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A87AD66C-4321-4459-8556-3B0BA38C493A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87A347E0-9C0B-4674-9363-3C36DA27AC45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3975EC77-D33D-4167-91BE-08237C3EE9D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0F2534-C267-43D9-8365-C00CD979B052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27430190-EB83-43C5-9584-4F65CF65151A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C386B13F-9D7C-45F8-B86A-886384144A8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04BCABEB-DE2A-4C85-BFD5-7A1318479ECA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A67A63E8-837E-4162-999E-3B3DAAE57C96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A701E87D-B807-426E-9CD4-6721DBCABE19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F6E506-EC0A-4784-BDA3-B7B5CD938B92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBFA0277-B491-4BB1-88DC-85362F0A689C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE922924-6496-4D24-94A6-8EDD431A4568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E55450-F6D9-483C-9CC8-E651E5A12AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC40B6DE-09D9-422B-965B-7EB9F6661DEB\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer basado en memoria din\\u00e1mica en la funci\\u00f3n parse_tag_3_packet en fs/ecryptfs/keystore.c en el subsistema eCryptfs del kernel de Linux anteriores a v2.6.30.4 permite a usuarios locales provocar una denegaci\\u00f3n de servicio (finalizaci\\u00f3n del sistema) o posiblemente obtener mayores privilegios mediante vectores que emplean un fichero eCryptfs modificado, relacionado con un tama\\u00f1o de clave de cifrado larga en un paquete \\\"Tag 3\\\".\"}]",
"id": "CVE-2009-2407",
"lastModified": "2024-11-21T01:04:47.907",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 6.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.4, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-07-31T19:00:01.187",
"references": "[{\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://risesecurity.org/advisories/RISE-2009003.txt\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://secunia.com/advisories/35985\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36045\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36051\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36054\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36116\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36131\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1844\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.debian.org/security/2009/dsa-1845\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1193.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/505337/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/35850\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-807-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2041\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://risesecurity.org/advisories/RISE-2009003.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://secunia.com/advisories/35985\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36045\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36051\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36054\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36116\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36131\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1844\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.debian.org/security/2009/dsa-1845\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1193.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/505337/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/35850\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-807-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2041\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.\\n\\nRed Hat Enterprise Linux 5 was vulnerable to this issue and was addressed via: https://rhn.redhat.com/errata/RHSA-2009-1193.html\", \"lastModified\": \"2009-08-18T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-2407\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-07-31T19:00:01.187\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n parse_tag_3_packet en fs/ecryptfs/keystore.c en el subsistema eCryptfs del kernel de Linux anteriores a v2.6.30.4 permite a usuarios locales provocar una denegaci\u00f3n de servicio (finalizaci\u00f3n del sistema) o posiblemente obtener mayores privilegios mediante vectores que emplean un fichero eCryptfs modificado, relacionado con un tama\u00f1o de clave de cifrado larga en un paquete \\\"Tag 3\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":6.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.30.3\",\"matchCriteriaId\":\"35E762F1-57F3-4E5D-938D-F966F4F5EDB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE92406-DBF3-463E-8A51-F9679E851FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C60D19B-ED9B-443C-9D49-002ABD381119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B6847C-873B-4BE1-852D-239115E59BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF41209E-D27F-4642-A405-90E822A41897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F59FD9-46E5-4F63-80A0-091AD44D1867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9D70D-A552-48D6-9497-EE07EB5649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192B4273-0935-4232-BBFD-A850855CAC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16F2182-C489-4CA9-A56B-01463148D16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF91995-A084-422A-A544-30B0B4D75E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA56669-B09E-42C2-9591-245C46909A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D08D180-23F7-456F-98CA-26B53C678D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E3C363-49C9-4869-83B5-76C14100BFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856FE78A-29B5-4411-98A0-4B0281C17EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11795F8E-7ACD-4597-9194-FC7241DCE057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7954A701-1671-4080-B1E6-47E0208FD28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D06512-EAF0-48C6-98F0-066E63FF07EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75B48F1-623A-4B96-9E08-4AA2DE748490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E6EB7C3-D9AB-43E7-8B78-2C36AE920935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0383E2A5-60EE-47F3-9DA8-BF75028D511F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B0C229-2A79-47E0-856A-2AE0FF97B967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB27B247-D6BF-49C4-B113-76C9A47B7DCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F94BA1B0-52B9-4303-9C41-3ACC3AC1945E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACBB194-1D24-464A-B79C-44B8127EAD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E5F269-7711-447D-B798-0F5478E36299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0138807-6313-4A3F-AB5A-4B7D4A9BE287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA2227-F259-499D-BF50-5074B1E7DD3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78A896D0-032C-4467-9D57-E47E8C612704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1D4C8F-8C09-4A49-AFFD-33093AE7A437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A415FECF-89CC-4D71-B1BF-6A678D32599D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F77E54-5F4A-4D47-8DE8-097B4BBC7944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752148FC-1594-4108-AE0F-C5145B978454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09546671-E75D-4F50-9D86-DFDDAC9DC5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6964925C-4394-4E82-976B-770A99E74F1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8C909E-02D7-4B29-AA68-897BD0200B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BD805F-08EB-42EC-BC54-26A7278E5089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"217715A5-E69D-45C0-B8E4-5681528C651B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A87AD66C-4321-4459-8556-3B0BA38C493A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A347E0-9C0B-4674-9363-3C36DA27AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3975EC77-D33D-4167-91BE-08237C3EE9D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0F2534-C267-43D9-8365-C00CD979B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27430190-EB83-43C5-9584-4F65CF65151A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386B13F-9D7C-45F8-B86A-886384144A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BCABEB-DE2A-4C85-BFD5-7A1318479ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67A63E8-837E-4162-999E-3B3DAAE57C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A701E87D-B807-426E-9CD4-6721DBCABE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F6E506-EC0A-4784-BDA3-B7B5CD938B92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFA0277-B491-4BB1-88DC-85362F0A689C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE922924-6496-4D24-94A6-8EDD431A4568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E55450-F6D9-483C-9CC8-E651E5A12AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC40B6DE-09D9-422B-965B-7EB9F6661DEB\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://risesecurity.org/advisories/RISE-2009003.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/35985\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36045\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36054\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36116\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36131\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1845\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1193.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/505337/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/35850\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-807-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2041\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://risesecurity.org/advisories/RISE-2009003.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/35985\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36054\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1193.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/505337/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35850\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-807-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.\\n\\nRed Hat Enterprise Linux 5 was vulnerable to this issue and was addressed via: https://rhn.redhat.com/errata/RHSA-2009-1193.html\",\"lastModified\":\"2009-08-18T00:00:00\"}]}}"
}
}
RHSA-2009_1193
Vulnerability from csaf_redhat - Published: 2009-08-04 13:10 - Updated: 2024-11-22 03:13Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1193",
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
"url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
},
{
"category": "external",
"summary": "453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "497812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
},
{
"category": "external",
"summary": "502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "503689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
},
{
"category": "external",
"summary": "503692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
},
{
"category": "external",
"summary": "504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "505322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
},
{
"category": "external",
"summary": "506029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
},
{
"category": "external",
"summary": "506906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
},
{
"category": "external",
"summary": "507529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
},
{
"category": "external",
"summary": "507561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
},
{
"category": "external",
"summary": "508275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
},
{
"category": "external",
"summary": "510018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
},
{
"category": "external",
"summary": "510239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
},
{
"category": "external",
"summary": "511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "512311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
},
{
"category": "external",
"summary": "512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T03:13:04+00:00",
"generator": {
"date": "2024-11-22T03:13:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1193",
"initial_release_date": "2009-08-04T13:10:00+00:00",
"revision_history": [
{
"date": "2009-08-04T13:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-04T09:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:13:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product_id": "kernel-0:2.6.18-128.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5966",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2007-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "453135"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: non-root can trigger cpu_idle soft lockup",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5966"
},
{
"category": "external",
"summary": "RHBZ#453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
}
],
"release_date": "2007-12-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: non-root can trigger cpu_idle soft lockup"
},
{
"cve": "CVE-2009-1385",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "502981"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: e1000_clean_rx_irq() denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1385"
},
{
"category": "external",
"summary": "RHBZ#502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
}
],
"release_date": "2007-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: e1000_clean_rx_irq() denial of service"
},
{
"cve": "CVE-2009-1388",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504263"
}
],
"notes": [
{
"category": "description",
"text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_coredump() vs ptrace_start() deadlock",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1388"
},
{
"category": "external",
"summary": "RHBZ#504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: do_coredump() vs ptrace_start() deadlock"
},
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1895",
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511171"
}
],
"notes": [
{
"category": "description",
"text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: personality: fix PER_CLEAR_ON_SETID",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1895"
},
{
"category": "external",
"summary": "RHBZ#511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: personality: fix PER_CLEAR_ON_SETID"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2406",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512861"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2406"
},
{
"category": "external",
"summary": "RHBZ#512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2407",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512885"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2407"
},
{
"category": "external",
"summary": "RHBZ#512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
}
]
}
RHSA-2009:1193
Vulnerability from csaf_redhat - Published: 2009-08-04 13:10 - Updated: 2025-11-21 17:34Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1193",
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
"url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
},
{
"category": "external",
"summary": "453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "497812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
},
{
"category": "external",
"summary": "502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "503689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
},
{
"category": "external",
"summary": "503692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
},
{
"category": "external",
"summary": "504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "505322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
},
{
"category": "external",
"summary": "506029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
},
{
"category": "external",
"summary": "506906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
},
{
"category": "external",
"summary": "507529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
},
{
"category": "external",
"summary": "507561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
},
{
"category": "external",
"summary": "508275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
},
{
"category": "external",
"summary": "510018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
},
{
"category": "external",
"summary": "510239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
},
{
"category": "external",
"summary": "511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "512311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
},
{
"category": "external",
"summary": "512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:34:59+00:00",
"generator": {
"date": "2025-11-21T17:34:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1193",
"initial_release_date": "2009-08-04T13:10:00+00:00",
"revision_history": [
{
"date": "2009-08-04T13:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-04T09:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.src",
"product_id": "kernel-0:2.6.18-128.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
"product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5966",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2007-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "453135"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: non-root can trigger cpu_idle soft lockup",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5966"
},
{
"category": "external",
"summary": "RHBZ#453135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
}
],
"release_date": "2007-12-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: non-root can trigger cpu_idle soft lockup"
},
{
"cve": "CVE-2009-1385",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2009-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "502981"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: e1000_clean_rx_irq() denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1385"
},
{
"category": "external",
"summary": "RHBZ#502981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
}
],
"release_date": "2007-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: e1000_clean_rx_irq() denial of service"
},
{
"cve": "CVE-2009-1388",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504263"
}
],
"notes": [
{
"category": "description",
"text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: do_coredump() vs ptrace_start() deadlock",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1388"
},
{
"category": "external",
"summary": "RHBZ#504263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: do_coredump() vs ptrace_start() deadlock"
},
{
"cve": "CVE-2009-1389",
"discovery_date": "2009-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504726"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: r8169: fix crash when large packets are received",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1389"
},
{
"category": "external",
"summary": "RHBZ#504726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
}
],
"release_date": "2009-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: r8169: fix crash when large packets are received"
},
{
"cve": "CVE-2009-1895",
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511171"
}
],
"notes": [
{
"category": "description",
"text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: personality: fix PER_CLEAR_ON_SETID",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1895"
},
{
"category": "external",
"summary": "RHBZ#511171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: personality: fix PER_CLEAR_ON_SETID"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2406",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512861"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2406"
},
{
"category": "external",
"summary": "RHBZ#512861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
},
{
"acknowledgments": [
{
"names": [
"Ramon de C. Valle"
]
}
],
"cve": "CVE-2009-2407",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2009-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512885"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2407"
},
{
"category": "external",
"summary": "RHBZ#512885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
}
],
"release_date": "2009-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-04T13:10:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-0:2.6.18-128.4.1.el5.src",
"5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
"5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-0:2.6.18-128.4.1.el5.src",
"5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
FKIE_CVE-2009-2407
Vulnerability from fkie_nvd - Published: 2009-07-31 19:00 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35E762F1-57F3-4E5D-938D-F966F4F5EDB9",
"versionEndIncluding": "2.6.30.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7936B7EE-9CD1-4698-AD67-C619D0171A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5738D628-0B2D-4F56-9427-2009BFCB6C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EBCB4-FCF4-479A-A44D-D913F7F09C77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD34526D-F2CC-44C5-991D-B1E41C327860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F0B900-34E9-4545-B7AE-AF0A4363EACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B36F432D-FED1-4B8D-A458-BEDEEF306AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25379B32-D898-4E44-A740-978A129B5E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B90F8F2-9549-413D-9676-3EF634D832B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "915E64EF-6EEC-4DE2-A285-5F3FCE389645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "585BEE46-088A-494E-8E18-03F33F6BBEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF35478-B292-4A00-B985-CEEDE8B212C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E85846A-61BE-4896-B4A6-42A7E1DBA515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E3B925-031D-4F6D-915A-A16F0FFA878C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "66F5AE3B-B701-4579-B44A-0F7A4267852E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"matchCriteriaId": "03FB31E5-190C-489A-AB30-910D2CC854F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4A781A-4A41-466F-8426-10B40CF8BA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F6316369-B54A-4E59-A022-E0610353B284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"matchCriteriaId": "073C3CE0-E12D-4545-8460-5A1514271D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"matchCriteriaId": "670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB33DEA-13C7-4B36-AB8A-ED680679A071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"matchCriteriaId": "86DD0FCC-BB12-410D-8C82-AB99C7C5311E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"matchCriteriaId": "83700989-8820-48DA-A9FE-6A77DF1E8439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9F4CEC-7781-468B-B460-4F487B7C6601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"matchCriteriaId": "67C75A62-8807-4821-9362-1E0D63C0A1B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"matchCriteriaId": "894D4812-D62F-489E-8D0E-5E9468CE8EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92E01-4F08-4364-9E87-FFBC095E32E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F9960640-F02D-4E81-A34B-1893D8FD7F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D00DAD-4F2D-45C7-B87C-85118D9DD855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0C398D26-7132-4A6E-9003-77246644451B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5EED2DA2-2516-42E9-8A33-0FA64BF51DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FF425F00-41BA-4F59-A0DE-6362A1E9A142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"matchCriteriaId": "33577E79-1B6E-406D-A49B-2CEF1754F5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"matchCriteriaId": "8B21D90E-5172-485E-87AC-F1681604AD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C41F6822-92BF-43F5-8B3E-8BAF9E9A320D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"matchCriteriaId": "641EECFD-A985-4026-A53A-10FBE47EAD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"matchCriteriaId": "47595F81-2083-4236-A0B0-E2B98DD78402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5FC758-5A5D-466A-8386-5FC469F79F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA5C83-5293-4107-8E6A-85F82ECF2C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D0AADC-BC34-40FB-BD69-37981DC8E971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"matchCriteriaId": "12547B6B-78F1-4426-81CE-5F208794658C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"matchCriteriaId": "38429E64-276B-46D4-AACD-05349D6F6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E89640F8-313B-4A36-A591-36645D1EF838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0271F0-41F2-4096-8C91-DAD1A81AF855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"matchCriteriaId": "7A40DCBB-B41B-468E-A918-6EA3F9A125E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"matchCriteriaId": "921B6A54-85E3-4867-8EDF-93EB86BAFBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"matchCriteriaId": "2B004CF1-0ACC-441C-9F61-9B20504F4ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"matchCriteriaId": "04B42F06-AC6D-40F3-BC03-5126BED48F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8002C7-19E2-4F20-890E-4BA2029174D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"matchCriteriaId": "34FC90C2-AED0-4EAF-B5E8-DE75961DA26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DA9C54-742C-4057-8BAB-18755B4A42D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"matchCriteriaId": "84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"matchCriteriaId": "53037B40-D534-41D1-9895-8EDB0D884C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"matchCriteriaId": "5549096F-C640-463E-AD07-FD8D254CC098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F8DCAF19-879C-42BB-B56A-84504E79758A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF566DA-0F04-48DA-AA40-565979C55328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"matchCriteriaId": "67F2047A-5F17-4B59-9075-41A5DC5C1CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"matchCriteriaId": "80F9887E-2466-4C73-A8E1-2117492F9EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDE5B27-2EF0-464E-8F14-5E809D84D389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"matchCriteriaId": "815B2EE8-136F-44E4-997D-5F93A54775DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B64A095E-5E97-445E-B435-F09983CC0E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE92406-DBF3-463E-8A51-F9679E851FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C60D19B-ED9B-443C-9D49-002ABD381119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"matchCriteriaId": "264C61EE-64F6-43AD-B54F-7D683C29E64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0149408A-30F6-4EDF-8B3B-CBAB884CE758",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "71295664-89EC-4BB3-9F86-B1DDA20FAC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37BE853A-BA6F-4A70-B166-E34441F0B7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85064FDF-4B62-43BF-B36C-F659D739BC22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEADC505-FF44-4D45-8EA6-B23A1C4564D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE3C807-5C9B-4B71-868B-DF17ECB1514F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6847C-873B-4BE1-852D-239115E59BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FF41209E-D27F-4642-A405-90E822A41897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"matchCriteriaId": "97F59FD9-46E5-4F63-80A0-091AD44D1867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"matchCriteriaId": "428844A5-E020-4AE9-8012-9AEDFCB7C32E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94C9D70D-A552-48D6-9497-EE07EB5649D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF6169FF-9FF9-4A81-BAEB-6D5132F64F61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E6DC79CF-A504-4232-9F66-B5DCD0213DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"matchCriteriaId": "192B4273-0935-4232-BBFD-A850855CAC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"matchCriteriaId": "60E9FDA8-7EC3-4B9B-B508-27F948D60DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A16F2182-C489-4CA9-A56B-01463148D16F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"matchCriteriaId": "630A56D3-7A82-44DE-8888-2EB8CD1C24A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0D6431-E8E0-4079-A1A0-9CE6D1D67709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4EF7A7-6E96-43B4-8287-368098ABBFA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF91995-A084-422A-A544-30B0B4D75E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E45F4429-5A9C-4E8B-96EE-CCF19776CABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1EFCAF09-BB20-424C-8648-014C0F71F8A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3A74970C-5EEA-47A7-A62D-AF98F4D1228F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEA56669-B09E-42C2-9591-245C46909A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3D08D180-23F7-456F-98CA-26B53C678D76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*",
"matchCriteriaId": "80E3C363-49C9-4869-83B5-76C14100BFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BC02BA18-9235-45CA-A3D6-0EB21CE69DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"matchCriteriaId": "324B5A3E-FA65-4F02-9B8F-872F38CD1808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE21E2AE-9E01-471C-A419-6AB40A49C2F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADFC2D46-65D0-426F-9AF8-8C910AE91D49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11795F8E-7ACD-4597-9194-FC7241DCE057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"matchCriteriaId": "60F381E1-F3C5-49BE-B094-4D90E7B108F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D82A6217-CFA6-4E72-8BED-0297E13EABF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7954A701-1671-4080-B1E6-47E0208FD28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"matchCriteriaId": "63D06512-EAF0-48C6-98F0-066E63FF07EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7F35DA6B-C6D4-47CC-97E7-9659DCFDD162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D75B48F1-623A-4B96-9E08-4AA2DE748490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6EB7C3-D9AB-43E7-8B78-2C36AE920935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0383E2A5-60EE-47F3-9DA8-BF75028D511F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B0C229-2A79-47E0-856A-2AE0FF97B967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FB27B247-D6BF-49C4-B113-76C9A47B7DCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F94BA1B0-52B9-4303-9C41-3ACC3AC1945E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
"matchCriteriaId": "1ACBB194-1D24-464A-B79C-44B8127EAD52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"matchCriteriaId": "83E5F269-7711-447D-B798-0F5478E36299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A0138807-6313-4A3F-AB5A-4B7D4A9BE287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BA2227-F259-499D-BF50-5074B1E7DD3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"matchCriteriaId": "78A896D0-032C-4467-9D57-E47E8C612704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1D4C8F-8C09-4A49-AFFD-33093AE7A437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*",
"matchCriteriaId": "A415FECF-89CC-4D71-B1BF-6A678D32599D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*",
"matchCriteriaId": "98F77E54-5F4A-4D47-8DE8-097B4BBC7944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*",
"matchCriteriaId": "752148FC-1594-4108-AE0F-C5145B978454",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*",
"matchCriteriaId": "09546671-E75D-4F50-9D86-DFDDAC9DC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*",
"matchCriteriaId": "6964925C-4394-4E82-976B-770A99E74F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C909E-02D7-4B29-AA68-897BD0200B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"matchCriteriaId": "26BD805F-08EB-42EC-BC54-26A7278E5089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217715A5-E69D-45C0-B8E4-5681528C651B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A87AD66C-4321-4459-8556-3B0BA38C493A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "87A347E0-9C0B-4674-9363-3C36DA27AC45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E0F3DF0-6BD0-4560-9A13-C6493939D8B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38A55F08-88A9-42D5-A2B1-8B8C0D6DED09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3975EC77-D33D-4167-91BE-08237C3EE9D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0F2534-C267-43D9-8365-C00CD979B052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27430190-EB83-43C5-9584-4F65CF65151A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"matchCriteriaId": "C386B13F-9D7C-45F8-B86A-886384144A8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04BCABEB-DE2A-4C85-BFD5-7A1318479ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A67A63E8-837E-4162-999E-3B3DAAE57C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A701E87D-B807-426E-9CD4-6721DBCABE19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*",
"matchCriteriaId": "66F6E506-EC0A-4784-BDA3-B7B5CD938B92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFA0277-B491-4BB1-88DC-85362F0A689C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BE922924-6496-4D24-94A6-8EDD431A4568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"matchCriteriaId": "10E55450-F6D9-483C-9CC8-E651E5A12AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC40B6DE-09D9-422B-965B-7EB9F6661DEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n parse_tag_3_packet en fs/ecryptfs/keystore.c en el subsistema eCryptfs del kernel de Linux anteriores a v2.6.30.4 permite a usuarios locales provocar una denegaci\u00f3n de servicio (finalizaci\u00f3n del sistema) o posiblemente obtener mayores privilegios mediante vectores que emplean un fichero eCryptfs modificado, relacionado con un tama\u00f1o de clave de cifrado larga en un paquete \"Tag 3\"."
}
],
"id": "CVE-2009-2407",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-07-31T19:00:01.187",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35985"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36045"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36051"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36054"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36116"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36131"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/37471"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35850"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35985"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36045"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36054"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35850"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vendorComments": [
{
"comment": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.\n\nRed Hat Enterprise Linux 5 was vulnerable to this issue and was addressed via: https://rhn.redhat.com/errata/RHSA-2009-1193.html",
"lastModified": "2009-08-18T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2009-2407
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-2407",
"description": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"id": "GSD-2009-2407",
"references": [
"https://www.suse.com/security/cve/CVE-2009-2407.html",
"https://www.debian.org/security/2009/dsa-1844",
"https://www.debian.org/security/2009/dsa-1845",
"https://access.redhat.com/errata/RHSA-2009:1193",
"https://linux.oracle.com/cve/CVE-2009-2407.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-2407"
],
"details": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"id": "GSD-2009-2407",
"modified": "2023-12-13T01:19:46.739800Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-2407",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "http://www.vupen.com/english/advisories/2009/3316",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "http://secunia.com/advisories/36051",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36051"
},
{
"name": "http://secunia.com/advisories/36131",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36131"
},
{
"name": "http://secunia.com/advisories/37471",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37471"
},
{
"name": "http://www.debian.org/security/2009/dsa-1844",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1193.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "http://secunia.com/advisories/36045",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36045"
},
{
"name": "http://www.ubuntu.com/usn/usn-807-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"name": "http://secunia.com/advisories/36054",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36054"
},
{
"name": "http://secunia.com/advisories/36116",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36116"
},
{
"name": "http://www.debian.org/security/2009/dsa-1845",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
},
{
"name": "http://secunia.com/advisories/35985",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35985"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4",
"refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"name": "http://www.vupen.com/english/advisories/2009/2041",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"name": "http://risesecurity.org/advisories/RISE-2009003.txt",
"refsource": "MISC",
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
},
{
"name": "http://www.securityfocus.com/archive/1/505337/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/35850",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/35850"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.6.30.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-2407"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://risesecurity.org/advisories/RISE-2009003.txt",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
},
{
"name": "36054",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36054"
},
{
"name": "35850",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35850"
},
{
"name": "DSA-1844",
"refsource": "DEBIAN",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"name": "DSA-1845",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"name": "36045",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36045"
},
{
"name": "ADV-2009-2041",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"name": "35985",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35985"
},
{
"name": "36051",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36051"
},
{
"name": "USN-807-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"name": "FEDORA-2009-8144",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
},
{
"name": "FEDORA-2009-8264",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"name": "36116",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36116"
},
{
"name": "RHSA-2009:1193",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"name": "36131",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36131"
},
{
"name": "SUSE-SR:2009:015",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "37471",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37471"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "oval:org.mitre.oval:def:8057",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
},
{
"name": "oval:org.mitre.oval:def:11255",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:20Z",
"publishedDate": "2009-07-31T19:00Z"
}
}
}
GHSA-493M-7433-V62C
Vulnerability from github – Published: 2022-05-02 03:35 – Updated: 2022-05-02 03:35Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
{
"affected": [],
"aliases": [
"CVE-2009-2407"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-07-31T19:00:00Z",
"severity": "MODERATE"
},
"details": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
"id": "GHSA-493m-7433-v62c",
"modified": "2022-05-02T03:35:02Z",
"published": "2022-05-02T03:35:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2009:1193"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2009-2407"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f151cd2c54ddc7714e2f740681350476cda03a28"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
},
{
"type": "WEB",
"url": "http://risesecurity.org/advisories/RISE-2009003.txt"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35985"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36045"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36051"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36054"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36116"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36131"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37471"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1844"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1845"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/505337/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/35850"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-807-1"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/2041"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/3316"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.