Action not permitted
Modal body text goes here.
CVE-2010-4169
Vulnerability from cvelistv5
Published
2010-11-20 21:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SA:2011:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "name": "42778", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42778" }, { "name": "44861", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44861" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2" }, { "name": "FEDORA-2010-18983", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da" }, { "name": "SUSE-SA:2011:001", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "42932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42932" }, { "name": "kernel-perfeventmmap-dos(63316)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63316" }, { "name": "ADV-2011-0124", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "name": "SUSE-SA:2011:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "ADV-2010-3321", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "ADV-2011-0298", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "RHSA-2010:0958", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "[oss-security] 20101115 Re: CVE request: kernel: perf bug", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2" }, { "name": "[oss-security] 20101115 CVE request: kernel: perf bug", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2" }, { "name": "ADV-2011-0012", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "42745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42745" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SA:2011:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "name": "42778", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42778" }, { "name": "44861", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44861" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2" }, { "name": "FEDORA-2010-18983", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da" }, { "name": "SUSE-SA:2011:001", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "42932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42932" }, { "name": "kernel-perfeventmmap-dos(63316)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63316" }, { "name": "ADV-2011-0124", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "name": "SUSE-SA:2011:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "ADV-2010-3321", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "ADV-2011-0298", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "RHSA-2010:0958", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "[oss-security] 20101115 Re: CVE request: kernel: perf bug", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2" }, { "name": "[oss-security] 20101115 CVE request: kernel: perf bug", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2" }, { "name": "ADV-2011-0012", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "42745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42745" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4169", "datePublished": "2010-11-20T21:00:00", "dateReserved": "2010-11-04T00:00:00", "dateUpdated": "2024-08-07T03:34:37.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-4169\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-11-22T13:00:19.537\",\"lastModified\":\"2024-11-21T01:20:21.910\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en mm/mprotect.c en las versiones del kernel de Linux anteriores a v2.6.37-rc2 permite a usuarios locales causar una denegaci\u00f3n de servicio a trav\u00e9s de vectores que implican una llamada de sistema a mprotect.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.37\",\"matchCriteriaId\":\"76630B45-B590-4651-972E-F938A83010C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"79F8D440-02E8-4BF7-8F56-31E4F349166B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA6C6E6-CAD5-4D43-AD96-66D5ACBB91CE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D59BD0-43DE-4E58-A057-640AB98359A6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FBDD82-691C-4D9D-B71B-F9AFF6931B53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"640FB29C-1A84-41E1-86DE-B542EA0EF153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE26596F-F10E-44EF-88CA-0080646E91B9\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42745\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42778\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42932\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0958.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/44861\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3321\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0012\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0124\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=651671\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/63316\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0958.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/44861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=651671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/63316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
rhsa-2010_0958
Vulnerability from csaf_redhat
Published
2010-12-08 19:07
Modified
2024-11-22 04:23
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix multiple security issues and three bugs
are now available for Red Hat Enterprise MRG 1.3.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* Missing sanity checks in the Intel i915 driver in the Linux kernel could
allow a local, unprivileged user to escalate their privileges.
(CVE-2010-2962, Important)
* A flaw in sctp_packet_config() in the Linux kernel's Stream Control
Transmission Protocol (SCTP) implementation could allow a remote attacker
to cause a denial of service. (CVE-2010-3432, Important)
* A missing integer overflow check in snd_ctl_new() in the Linux kernel's
sound subsystem could allow a local, unprivileged user on a 32-bit system
to cause a denial of service or escalate their privileges. (CVE-2010-3442,
Important)
* A flaw in sctp_auth_asoc_get_hmac() in the Linux kernel's SCTP
implementation. When iterating through the hmac_ids array, it did not reset
the last id element if it was out of range. This could allow a remote
attacker to cause a denial of service. (CVE-2010-3705, Important)
* Missing sanity checks in setup_arg_pages() in the Linux kernel. When
making the size of the argument and environment area on the stack very
large, it could trigger a BUG_ON(), resulting in a local denial of service.
(CVE-2010-3858, Moderate)
* A flaw in ethtool_get_rxnfc() in the Linux kernel's ethtool IOCTL
handler. When it is called with a large info.rule_cnt, it could allow a
local user to cause an information leak. (CVE-2010-3861, Moderate)
* A flaw in bcm_connect() in the Linux kernel's Controller Area Network
(CAN) Broadcast Manager. On 64-bit systems, writing the socket address may
overflow the procname character array. (CVE-2010-3874, Moderate)
* A flaw in inet_csk_diag_dump() in the Linux kernel's module for
monitoring the sockets of INET transport protocols. By sending a netlink
message with certain bytecode, a local, unprivileged user could cause a
denial of service. (CVE-2010-3880, Moderate)
* Missing sanity checks in gdth_ioctl_alloc() in the gdth driver in the
Linux kernel, could allow a local user with access to "/dev/gdth" on a
64-bit system to cause a denial of service or escalate their privileges.
(CVE-2010-4157, Moderate)
* A use-after-free flaw in the mprotect() system call could allow a local,
unprivileged user to cause a local denial of service. (CVE-2010-4169,
Moderate)
* Missing initialization flaws in the Linux kernel could lead to
information leaks. (CVE-2010-3876, CVE-2010-4072, CVE-2010-4073,
CVE-2010-4074, CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080,
CVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)
Red Hat would like to thank Kees Cook for reporting CVE-2010-2962,
CVE-2010-3861, and CVE-2010-4072; Dan Rosenberg for reporting
CVE-2010-3442, CVE-2010-3705, CVE-2010-3874, CVE-2010-4073, CVE-2010-4074,
CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4082,
CVE-2010-4083, and CVE-2010-4158; Brad Spengler for reporting
CVE-2010-3858; Nelson Elhage for reporting CVE-2010-3880; and Vasiliy
Kulikov for reporting CVE-2010-3876.
Bug fixes:
* A vulnerability in the 32-bit compatibility code for the VIDIOCSMICROCODE
IOCTL in the Video4Linux implementation. It does not affect Red Hat
Enterprise MRG, but as a preventive measure, this update removes the code.
Red Hat would like to thank Kees Cook for reporting this vulnerability.
(BZ#642469)
* The kernel-rt spec file was missing the crypto, drm, generated, and trace
header directories when generating the kernel-rt-devel package, resulting
in out-of-tree modules failing to build. (BZ#608784)
* On computers without a supported Performance Monitoring Unit, a crash
would occur when running the "perf top" command, and occasionally other
perf commands. perf software events are now marked as IRQ safe to avoid
this crash. (BZ#647434)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix multiple security issues and three bugs\nare now available for Red Hat Enterprise MRG 1.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* Missing sanity checks in the Intel i915 driver in the Linux kernel could\nallow a local, unprivileged user to escalate their privileges.\n(CVE-2010-2962, Important)\n\n* A flaw in sctp_packet_config() in the Linux kernel\u0027s Stream Control\nTransmission Protocol (SCTP) implementation could allow a remote attacker\nto cause a denial of service. (CVE-2010-3432, Important)\n\n* A missing integer overflow check in snd_ctl_new() in the Linux kernel\u0027s\nsound subsystem could allow a local, unprivileged user on a 32-bit system\nto cause a denial of service or escalate their privileges. (CVE-2010-3442,\nImportant)\n\n* A flaw in sctp_auth_asoc_get_hmac() in the Linux kernel\u0027s SCTP\nimplementation. When iterating through the hmac_ids array, it did not reset\nthe last id element if it was out of range. This could allow a remote\nattacker to cause a denial of service. (CVE-2010-3705, Important)\n\n* Missing sanity checks in setup_arg_pages() in the Linux kernel. When\nmaking the size of the argument and environment area on the stack very\nlarge, it could trigger a BUG_ON(), resulting in a local denial of service.\n(CVE-2010-3858, Moderate)\n\n* A flaw in ethtool_get_rxnfc() in the Linux kernel\u0027s ethtool IOCTL\nhandler. When it is called with a large info.rule_cnt, it could allow a\nlocal user to cause an information leak. (CVE-2010-3861, Moderate)\n\n* A flaw in bcm_connect() in the Linux kernel\u0027s Controller Area Network\n(CAN) Broadcast Manager. On 64-bit systems, writing the socket address may\noverflow the procname character array. (CVE-2010-3874, Moderate)\n\n* A flaw in inet_csk_diag_dump() in the Linux kernel\u0027s module for\nmonitoring the sockets of INET transport protocols. By sending a netlink\nmessage with certain bytecode, a local, unprivileged user could cause a\ndenial of service. (CVE-2010-3880, Moderate)\n\n* Missing sanity checks in gdth_ioctl_alloc() in the gdth driver in the\nLinux kernel, could allow a local user with access to \"/dev/gdth\" on a\n64-bit system to cause a denial of service or escalate their privileges.\n(CVE-2010-4157, Moderate)\n\n* A use-after-free flaw in the mprotect() system call could allow a local,\nunprivileged user to cause a local denial of service. (CVE-2010-4169,\nModerate)\n\n* Missing initialization flaws in the Linux kernel could lead to\ninformation leaks. (CVE-2010-3876, CVE-2010-4072, CVE-2010-4073,\nCVE-2010-4074, CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080,\nCVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)\n\nRed Hat would like to thank Kees Cook for reporting CVE-2010-2962,\nCVE-2010-3861, and CVE-2010-4072; Dan Rosenberg for reporting\nCVE-2010-3442, CVE-2010-3705, CVE-2010-3874, CVE-2010-4073, CVE-2010-4074,\nCVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4082,\nCVE-2010-4083, and CVE-2010-4158; Brad Spengler for reporting\nCVE-2010-3858; Nelson Elhage for reporting CVE-2010-3880; and Vasiliy\nKulikov for reporting CVE-2010-3876.\n\nBug fixes:\n\n* A vulnerability in the 32-bit compatibility code for the VIDIOCSMICROCODE\nIOCTL in the Video4Linux implementation. It does not affect Red Hat\nEnterprise MRG, but as a preventive measure, this update removes the code.\nRed Hat would like to thank Kees Cook for reporting this vulnerability.\n(BZ#642469)\n\n* The kernel-rt spec file was missing the crypto, drm, generated, and trace\nheader directories when generating the kernel-rt-devel package, resulting\nin out-of-tree modules failing to build. (BZ#608784)\n\n* On computers without a supported Performance Monitoring Unit, a crash\nwould occur when running the \"perf top\" command, and occasionally other\nperf commands. perf software events are now marked as IRQ safe to avoid\nthis crash. (BZ#647434)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0958", "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "608784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608784" }, { "category": "external", "summary": "637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "642469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642469" }, { "category": "external", "summary": "645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "646725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646725" }, { "category": "external", "summary": "647434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647434" }, { "category": "external", "summary": "648656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648656" }, { "category": "external", "summary": "648658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648658" }, { "category": "external", "summary": "648659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648659" }, { "category": "external", "summary": "648660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648660" }, { "category": "external", "summary": "648663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648663" }, { "category": "external", "summary": "648666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648666" }, { "category": "external", "summary": "648669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648669" }, { "category": "external", "summary": "648671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648671" }, { "category": "external", "summary": "648673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "category": "external", "summary": "649695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649695" }, { "category": "external", "summary": "649715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "category": "external", "summary": "651147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "category": "external", "summary": "651264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651264" }, { "category": "external", "summary": "651671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "category": "external", "summary": "651698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651698" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0958.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:23:10+00:00", "generator": { "date": "2024-11-22T04:23:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0958", "initial_release_date": "2010-12-08T19:07:00+00:00", "revision_history": [ { "date": "2010-12-08T19:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-12-08T14:08:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:23:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.7-rt29.47.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.7-rt29.47.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.33.7-rt29.47.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "product_id": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "perf-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686" }, "product_reference": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-2962", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637688" } ], "notes": [ { "category": "description", "text": "drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: arbitrary kernel memory write via i915 GEM ioctl", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not include support for Graphics Execution Manager (GEM) in the i915 driver, and therefore are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2962" }, { "category": "external", "summary": "RHBZ#637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2962", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962" } ], "release_date": "2010-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: arbitrary kernel memory write via i915 GEM ioctl" }, { "cve": "CVE-2010-3432", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637675" } ], "notes": [ { "category": "description", "text": "The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: do not reset the packet during sctp_packet_config", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3432" }, { "category": "external", "summary": "RHBZ#637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "category": "workaround", "details": "For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: do not reset the packet during sctp_packet_config" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3442", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638478" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: prevent heap corruption in snd_ctl_new()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3442" }, { "category": "external", "summary": "RHBZ#638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3442", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: prevent heap corruption in snd_ctl_new()" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3705", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "640036" } ], "notes": [ { "category": "description", "text": "The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp memory corruption in HMAC handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-3705.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. It did not affect Red Hat Enterprise Linux 4 and 5 as it did not include upstream commit 1f485649 that introduced the problem. Future kernel updates in Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3705" }, { "category": "external", "summary": "RHBZ#640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705" } ], "release_date": "2010-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp memory corruption in HMAC handling" }, { "acknowledgments": [ { "names": [ "Brad Spengler" ] } ], "cve": "CVE-2010-3858", "discovery_date": "2010-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "645222" } ], "notes": [ { "category": "description", "text": "The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setup_arg_pages: diagnose excessive argument size", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as they did not backport the upstream commit b6a2fea3 that introduced the issue. This was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html and \nhttps://rhn.redhat.com/errata/RHSA-2010-0958.html. Future kernel updates in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3858" }, { "category": "external", "summary": "RHBZ#645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3858", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: setup_arg_pages: diagnose excessive argument size" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-3861", "discovery_date": "2010-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "646725" } ], "notes": [ { "category": "description", "text": "The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap contents leak from ETHTOOL_GRXCLSRLALL", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 and 4, as they do not include support for the Neptune\nEthernet driver. It did not affect Red Hat Enterprise Linux 5 as it did not contain the upstream commit 0853ad66 that introduced this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3861" }, { "category": "external", "summary": "RHBZ#646725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3861", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3861" } ], "release_date": "2010-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap contents leak from ETHTOOL_GRXCLSRLALL" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3874", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649695" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: CAN minor heap overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not include CAN bus subsystem support, and therefore are not affected by this issue. Future kernel updates in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3874" }, { "category": "external", "summary": "RHBZ#649695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649695" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3874", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3874" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3874", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3874" } ], "release_date": "2010-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: CAN minor heap overflow" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2010-3876", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "649715" } ], "notes": [ { "category": "description", "text": "net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/packet/af_packet.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to\nthis product being in Extended Life Cycle Phase of its maintenance life-cycle,\nwhere only qualified security errata of critical impact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3876" }, { "category": "external", "summary": "RHBZ#649715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876" } ], "release_date": "2010-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: net/packet/af_packet.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Nelson Elhage" ] } ], "cve": "CVE-2010-3880", "discovery_date": "2010-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651264" } ], "notes": [ { "category": "description", "text": "net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: logic error in INET_DIAG bytecode auditing", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for monitoring of INET transport protocol sockets. Future updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3880" }, { "category": "external", "summary": "RHBZ#651264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3880", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3880" } ], "release_date": "2010-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: logic error in INET_DIAG bytecode auditing" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" }, { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-4072", "discovery_date": "2010-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648656" } ], "notes": [ { "category": "description", "text": "The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the \"old shm interface.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/shm.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Extended Life Cycle Phase of its maintenance life-cycle, where only qualified security errata of critical impact are addressed.\n \nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4072" }, { "category": "external", "summary": "RHBZ#648656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4072", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4072" } ], "release_date": "2010-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/shm.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4073", "discovery_date": "2010-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648658" } ], "notes": [ { "category": "description", "text": "The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/compat*.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 as it did not include IPC compat functionality.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4073" }, { "category": "external", "summary": "RHBZ#648658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4073", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4073" } ], "release_date": "2010-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/compat*.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4074", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648659" } ], "notes": [ { "category": "description", "text": "The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and 5 as they did not include support for Moschip USB\nserial port adapters.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4074" }, { "category": "external", "summary": "RHBZ#648659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4074", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4074" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4075", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648660" } ], "notes": [ { "category": "description", "text": "The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/serial/serial_core.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3 as it did not include the affected functionality.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4075" }, { "category": "external", "summary": "RHBZ#648660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4075", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4075" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/serial/serial_core.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4077", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648663" } ], "notes": [ { "category": "description", "text": "The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/char/nozomi.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and 5 as they did not include support for GlobeTrotter\nHSPDA PCMCIA card.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4077" }, { "category": "external", "summary": "RHBZ#648663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4077", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4077" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/char/nozomi.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4079", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648666" } ], "notes": [ { "category": "description", "text": "The ivtvfb_ioctl function in drivers/media/video/ivtv/ivtvfb.c in the Linux kernel before 2.6.36-rc8 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, and 5 as they did not include support for the Conexant\u0027s\nCX23415/CX23416 codec chip.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4079" }, { "category": "external", "summary": "RHBZ#648666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648666" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4079", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4079" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4080", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648669" } ], "notes": [ { "category": "description", "text": "The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for RME Hammerfall DSP Audio.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4080" }, { "category": "external", "summary": "RHBZ#648669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4080", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4080" } ], "release_date": "2010-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4082", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648671" } ], "notes": [ { "category": "description", "text": "The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and 5 as they did not include support for VIA UniChrome (Pro) and Chrome9 graphics boards.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4082" }, { "category": "external", "summary": "RHBZ#648671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648671" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4082", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4082" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4082", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4082" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4083", "discovery_date": "2010-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "648673" } ], "notes": [ { "category": "description", "text": "The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipc/sem.c: reading uninitialized stack memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3,\ndue to this product being in Extended Life Cycle Phase of its\nmaintenance life-cycle, where only qualified security errata of critical\nimpact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4083" }, { "category": "external", "summary": "RHBZ#648673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083" } ], "release_date": "2010-09-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ipc/sem.c: reading uninitialized stack memory" }, { "cve": "CVE-2010-4157", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651147" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: integer overflow in ioc_general()", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 did not include the vulnerable code, and therefore is not affected by this issue. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4157" }, { "category": "external", "summary": "RHBZ#651147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4157", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157" } ], "release_date": "2010-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: gdth: integer overflow in ioc_general()" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4158", "discovery_date": "2010-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651698" } ], "notes": [ { "category": "description", "text": "The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: socket filters infoleak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4158" }, { "category": "external", "summary": "RHBZ#651698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4158", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4158" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: socket filters infoleak" }, { "cve": "CVE-2010-4169", "discovery_date": "2010-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651671" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf bug", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not backport the upstream commit dab5855 that introduced the issue. Future kernel updates in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4169" }, { "category": "external", "summary": "RHBZ#651671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4169", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169" } ], "release_date": "2010-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-12-08T19:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0958" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.47.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.47.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.47.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf bug" } ] }
rhsa-2011_0283
Vulnerability from csaf_redhat
Published
2011-02-22 17:37
Modified
2024-11-22 04:26
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
Updated kernel packages that fix three security issues, several bugs, and
add two enhancements are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* A divide-by-zero flaw was found in the tcp_select_initial_window()
function in the Linux kernel's TCP/IP protocol suite implementation. A
local, unprivileged user could use this flaw to trigger a denial of service
by calling setsockopt() with certain options. (CVE-2010-4165, Moderate)
* A use-after-free flaw in the mprotect() system call in the Linux kernel
could allow a local, unprivileged user to cause a local denial of service.
(CVE-2010-4169, Moderate)
* A flaw was found in the Linux kernel execve() system call implementation.
A local, unprivileged user could cause large amounts of memory to be
allocated but not visible to the OOM (Out of Memory) killer, triggering a
denial of service. (CVE-2010-4243, Moderate)
Red Hat would like to thank Steve Chen for reporting CVE-2010-4165, and
Brad Spengler for reporting CVE-2010-4243.
This update also fixes several bugs and adds two enhancements.
Documentation for these bug fixes and enhancements will be available
shortly from the Technical Notes document linked to in the References
section.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs and add the enhancements
noted in the Technical Notes. The system must be rebooted for this update
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix three security issues, several bugs, and\nadd two enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A divide-by-zero flaw was found in the tcp_select_initial_window()\nfunction in the Linux kernel\u0027s TCP/IP protocol suite implementation. A\nlocal, unprivileged user could use this flaw to trigger a denial of service\nby calling setsockopt() with certain options. (CVE-2010-4165, Moderate)\n\n* A use-after-free flaw in the mprotect() system call in the Linux kernel\ncould allow a local, unprivileged user to cause a local denial of service.\n(CVE-2010-4169, Moderate)\n\n* A flaw was found in the Linux kernel execve() system call implementation.\nA local, unprivileged user could cause large amounts of memory to be\nallocated but not visible to the OOM (Out of Memory) killer, triggering a\ndenial of service. (CVE-2010-4243, Moderate)\n\nRed Hat would like to thank Steve Chen for reporting CVE-2010-4165, and\nBrad Spengler for reporting CVE-2010-4243.\n\nThis update also fixes several bugs and adds two enhancements.\nDocumentation for these bug fixes and enhancements will be available\nshortly from the Technical Notes document linked to in the References\nsection.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs and add the enhancements\nnoted in the Technical Notes. The system must be rebooted for this update\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0283", "url": "https://access.redhat.com/errata/RHSA-2011:0283" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0283", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0283" }, { "category": "external", "summary": "625688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688" }, { "category": "external", "summary": "651671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "category": "external", "summary": "652508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652508" }, { "category": "external", "summary": "652720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652720" }, { "category": "external", "summary": "658854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658854" }, { "category": "external", "summary": "658891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658891" }, { "category": "external", "summary": "659610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659610" }, { "category": "external", "summary": "660590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660590" }, { "category": "external", "summary": "661730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661730" }, { "category": "external", "summary": "661731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661731" }, { "category": "external", "summary": "661737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661737" }, { "category": "external", "summary": "662721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662721" }, { "category": "external", "summary": "662921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662921" }, { "category": "external", "summary": "664398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664398" }, { "category": "external", "summary": "671342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671342" }, { "category": "external", "summary": "673978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=673978" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0283.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:26:23+00:00", "generator": { "date": "2024-11-22T04:26:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0283", "initial_release_date": "2011-02-22T17:37:00+00:00", "revision_history": [ { "date": "2011-02-22T17:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:38:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:26:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.18.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.18.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-71.18.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-71.18.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "perf-0:2.6.32-71.18.1.el6.noarch", "product": { "name": "perf-0:2.6.32-71.18.1.el6.noarch", "product_id": "perf-0:2.6.32-71.18.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-71.18.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-71.18.1.el6.src", "product": { "name": "kernel-0:2.6.32-71.18.1.el6.src", "product_id": "kernel-0:2.6.32-71.18.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.18.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.18.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.18.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.18.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.18.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-71.18.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.18.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.18.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.18.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.18.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.18.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.18.1.el6.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Steve Chen" ] } ], "cve": "CVE-2010-4165", "discovery_date": "2010-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "652508" } ], "notes": [ { "category": "description", "text": "The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible kernel oops from user MSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 as they did not backport the upstream commit that introduced the issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0283.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4165" }, { "category": "external", "summary": "RHBZ#652508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4165", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4165" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0283" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible kernel oops from user MSS" }, { "cve": "CVE-2010-4169", "discovery_date": "2010-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651671" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf bug", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not backport the upstream commit dab5855 that introduced the issue. Future kernel updates in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4169" }, { "category": "external", "summary": "RHBZ#651671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4169", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169" } ], "release_date": "2010-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0283" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf bug" }, { "acknowledgments": [ { "names": [ "Brad Spengler" ] } ], "cve": "CVE-2010-4243", "discovery_date": "2010-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "625688" } ], "notes": [ { "category": "description", "text": "fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an \"OOM dodging issue,\" a related issue to CVE-2010-3858.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4243" }, { "category": "external", "summary": "RHBZ#625688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4243", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4243" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4243", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4243" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0283" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-0:2.6.32-71.18.1.el6.src", "6Client:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Client:perf-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-0:2.6.32-71.18.1.el6.src", "6Server:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Server:perf-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.18.1.el6.src", "6Workstation:kernel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.18.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.18.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.18.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.18.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.18.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads" } ] }
gsd-2010-4169
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-4169", "description": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.", "id": "GSD-2010-4169", "references": [ "https://www.suse.com/security/cve/CVE-2010-4169.html", "https://access.redhat.com/errata/RHSA-2011:0283", "https://access.redhat.com/errata/RHSA-2010:0958", "https://linux.oracle.com/cve/CVE-2010-4169.html", "https://packetstormsecurity.com/files/cve/CVE-2010-4169" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-4169" ], "details": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.", "id": "GSD-2010-4169", "modified": "2023-12-13T01:21:29.621315Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "http://www.vupen.com/english/advisories/2011/0298", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "name": "http://secunia.com/advisories/42778", "refsource": "MISC", "url": "http://secunia.com/advisories/42778" }, { "name": "http://secunia.com/advisories/42932", "refsource": "MISC", "url": "http://secunia.com/advisories/42932" }, { "name": "http://www.vupen.com/english/advisories/2011/0012", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "http://www.vupen.com/english/advisories/2011/0124", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "name": "http://secunia.com/advisories/42745", "refsource": "MISC", "url": "http://secunia.com/advisories/42745" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "http://www.vupen.com/english/advisories/2010/3321", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da" }, { "name": "http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2" }, { "name": "http://www.securityfocus.com/bid/44861", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/44861" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63316", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63316" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=651671", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.6.37", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4169" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20101115 CVE request: kernel: perf bug", "refsource": "MLIST", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2" }, { "name": "44861", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/44861" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2" }, { "name": "[oss-security] 20101115 Re: CVE request: kernel: perf bug", "refsource": "MLIST", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=651671", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "name": "FEDORA-2010-18983", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "name": "42745", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42745" }, { "name": "ADV-2010-3321", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "name": "RHSA-2010:0958", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "name": "SUSE-SA:2011:001", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "name": "ADV-2011-0012", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "name": "42778", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42778" }, { "name": "ADV-2011-0124", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "name": "42932", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42932" }, { "name": "SUSE-SA:2011:004", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "name": "SUSE-SA:2011:007", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "ADV-2011-0298", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "kernel-perfeventmmap-dos(63316)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63316" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:27Z", "publishedDate": "2010-11-22T13:00Z" } } }
ghsa-cx34-9hmm-493f
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Details
Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
{ "affected": [], "aliases": [ "CVE-2010-4169" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-11-22T13:00:00Z", "severity": "MODERATE" }, "details": "Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.", "id": "GHSA-cx34-9hmm-493f", "modified": "2022-05-13T01:23:46Z", "published": "2022-05-13T01:23:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4169" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651671" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63316" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=63bfd7384b119409685a17d5c58f0b56e5dc03da" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=128979684911295\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=128984344103497\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/42745" }, { "type": "WEB", "url": "http://secunia.com/advisories/42778" }, { "type": "WEB", "url": "http://secunia.com/advisories/42932" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/44861" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0298" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.