Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1771
Vulnerability from cvelistv5
Published
2011-09-06 16:00
Modified
2024-08-06 22:37
Severity ?
EPSS score ?
Summary
The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[linux-cifs] 20110405 Re: Repeatable crash in 2.6.38 related to O_DIRECT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2" }, { "name": "[linux-cifs] 20110405 Repeatable crash in 2.6.38 related to O_DIRECT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2" }, { "name": "[oss-security] 20110509 CVE-2011-1771 kernel: cifs oops when creating file with O_DIRECT set", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/05/09/2" }, { "name": "8367", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8367" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[linux-cifs] 20110405 Re: Repeatable crash in 2.6.38 related to O_DIRECT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2" }, { "name": "[linux-cifs] 20110405 Repeatable crash in 2.6.38 related to O_DIRECT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2" }, { "name": "[oss-security] 20110509 CVE-2011-1771 kernel: cifs oops when creating file with O_DIRECT set", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/05/09/2" }, { "name": "8367", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8367" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1771", "datePublished": "2011-09-06T16:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-1771\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-09-06T16:55:07.320\",\"lastModified\":\"2024-11-21T01:27:00.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n cifs_close en fs/cifs/file.c en el kernel de Linux antes de su versi\u00f3n v2.6.39 permite a usuarios locales provocar una denegaci\u00f3n de servicio (puntero a NULL y Error) o posiblemente tener un impacto no especificado estableciendo el flag O_DIRECT durante un intento de abrir un archivo en un sistema de archivos CIFS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.39\",\"matchCriteriaId\":\"176353CE-F17E-4776-AD9F-19014DA75B76\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/8367\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/05/09/2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=703016\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/8367\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/05/09/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=703016\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
ghsa-68xv-2p42-wm3q
Vulnerability from github
Published
2022-05-13 01:25
Modified
2022-05-13 01:25
Severity ?
Details
The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.
{ "affected": [], "aliases": [ "CVE-2011-1771" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-09-06T16:55:00Z", "severity": "HIGH" }, "details": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.", "id": "GHSA-68xv-2p42-wm3q", "modified": "2022-05-13T01:25:05Z", "published": "2022-05-13T01:25:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1771" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7797069305d13252fd66cf722aa8f2cbeb3c95cd" }, { "type": "WEB", "url": "http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/8367" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2011/05/09/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2011_0836
Vulnerability from csaf_redhat
Published
2011-06-01 19:55
Modified
2024-11-22 04:26
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix multiple security issues and various bugs
are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* An integer underflow flaw, leading to a buffer overflow, was found in the
Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation.
This could allow a remote attacker to cause a denial of service.
(CVE-2011-1770, Important)
* Missing sanity checks were found in setup_arg_pages() in the Linux
kernel. When making the size of the argument and environment area on the
stack very large, it could trigger a BUG_ON(), resulting in a local denial
of service. (CVE-2010-3858, Moderate)
* A missing validation check was found in the bcm_release() and
raw_release() functions in the Linux kernel's Controller Area Network (CAN)
implementation. This could allow a local, unprivileged user to cause a
denial of service. (CVE-2011-1598, CVE-2011-1748, Moderate)
* The fix for Red Hat Bugzilla bug 656461, as provided in RHSA-2011:0542,
introduced a regression in the cifs_close() function in the Linux kernel's
Common Internet File System (CIFS) implementation. A local, unprivileged
user with write access to a CIFS file system could use this flaw to cause a
denial of service. (CVE-2011-1771, Moderate)
Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1770; Brad
Spengler for reporting CVE-2010-3858; and Oliver Hartkopp for reporting
CVE-2011-1748.
This update also fixes various bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.
Users should upgrade to these updated packages, which contain backported
patches to resolve these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and various bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An integer underflow flaw, leading to a buffer overflow, was found in the\nLinux kernel\u0027s Datagram Congestion Control Protocol (DCCP) implementation.\nThis could allow a remote attacker to cause a denial of service.\n(CVE-2011-1770, Important)\n\n* Missing sanity checks were found in setup_arg_pages() in the Linux\nkernel. When making the size of the argument and environment area on the\nstack very large, it could trigger a BUG_ON(), resulting in a local denial\nof service. (CVE-2010-3858, Moderate)\n\n* A missing validation check was found in the bcm_release() and\nraw_release() functions in the Linux kernel\u0027s Controller Area Network (CAN)\nimplementation. This could allow a local, unprivileged user to cause a\ndenial of service. (CVE-2011-1598, CVE-2011-1748, Moderate)\n\n* The fix for Red Hat Bugzilla bug 656461, as provided in RHSA-2011:0542,\nintroduced a regression in the cifs_close() function in the Linux kernel\u0027s\nCommon Internet File System (CIFS) implementation. A local, unprivileged\nuser with write access to a CIFS file system could use this flaw to cause a\ndenial of service. (CVE-2011-1771, Moderate)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2011-1770; Brad\nSpengler for reporting CVE-2010-3858; and Oliver Hartkopp for reporting\nCVE-2011-1748.\n\nThis update also fixes various bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to resolve these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0836", "url": "https://access.redhat.com/errata/RHSA-2011:0836" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-0836", "url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-0836" }, { "category": "external", "summary": "645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "698057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698057" }, { "category": "external", "summary": "703011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703011" }, { "category": "external", "summary": "703016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" }, { "category": "external", "summary": "704014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=704014" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0836.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:26:47+00:00", "generator": { "date": "2024-11-22T04:26:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0836", "initial_release_date": "2011-06-01T19:55:00+00:00", "revision_history": [ { "date": "2011-06-01T19:55:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-01T15:56:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:26:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-131.2.1.el6.x86_64", "product_id": "perf-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.2.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.2.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-131.2.1.el6.i686", "product": { "name": "perf-0:2.6.32-131.2.1.el6.i686", "product_id": "perf-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.2.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-131.2.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-131.2.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.2.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-131.2.1.el6.ppc64", "product_id": "perf-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.2.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.2.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "perf-0:2.6.32-131.2.1.el6.s390x", "product_id": "perf-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.2.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-131.2.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-131.2.1.el6.src", "product": { "name": "kernel-0:2.6.32-131.2.1.el6.src", "product_id": "kernel-0:2.6.32-131.2.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-131.2.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-131.2.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-131.2.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-131.2.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-131.2.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-131.2.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-131.2.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src" }, "product_reference": "kernel-0:2.6.32-131.2.1.el6.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-131.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-131.2.1.el6.noarch", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-131.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "perf-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "relates_to_product_reference": "6Server-6.1.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Brad Spengler" ] } ], "cve": "CVE-2010-3858", "discovery_date": "2010-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "645222" } ], "notes": [ { "category": "description", "text": "The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setup_arg_pages: diagnose excessive argument size", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as they did not backport the upstream commit b6a2fea3 that introduced the issue. This was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html and \nhttps://rhn.redhat.com/errata/RHSA-2010-0958.html. Future kernel updates in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3858" }, { "category": "external", "summary": "RHBZ#645222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3858", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3858" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-01T19:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: setup_arg_pages: diagnose excessive argument size" }, { "acknowledgments": [ { "names": [ "Oliver Hartkopp" ] } ], "cve": "CVE-2011-1598", "discovery_date": "2011-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "698057" } ], "notes": [ { "category": "description", "text": "The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: missing check in can/bcm and can/raw socket releases", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1598" }, { "category": "external", "summary": "RHBZ#698057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698057" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1598", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1598" } ], "release_date": "2011-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-01T19:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: missing check in can/bcm and can/raw socket releases" }, { "acknowledgments": [ { "names": [ "Oliver Hartkopp" ] } ], "cve": "CVE-2011-1748", "discovery_date": "2011-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "698057" } ], "notes": [ { "category": "description", "text": "The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: missing check in can/bcm and can/raw socket releases", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1748" }, { "category": "external", "summary": "RHBZ#698057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698057" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1748", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1748" } ], "release_date": "2011-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-01T19:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: missing check in can/bcm and can/raw socket releases" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2011-1770", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2011-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "703011" } ], "notes": [ { "category": "description", "text": "Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dccp: handle invalid feature options length", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Red Hat Enterprise Linux 4 and 5: Red Hat Enterprise Linux 4 does not provide support for the Datagram Congestion Control Protocol (DCCP), and Red Hat Enterprise Linux 5, which does support DCCP, did not backport the upstream commit that introduced this issue, e77b8363b. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0836.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1770" }, { "category": "external", "summary": "RHBZ#703011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1770", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1770" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1770", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1770" } ], "release_date": "2011-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-01T19:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: dccp: handle invalid feature options length" }, { "cve": "CVE-2011-1771", "discovery_date": "2011-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "703016" } ], "notes": [ { "category": "description", "text": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs oops when creating file with O_DIRECT set", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise Linux MRG as they did not backport the upstream commit cdff08e7 that introduced this issue. Future kernel updates for Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1771" }, { "category": "external", "summary": "RHBZ#703016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1771", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1771" } ], "release_date": "2011-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-01T19:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.src", "6Server-6.1.z:kernel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-devel-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-doc-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-firmware-0:2.6.32-131.2.1.el6.noarch", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-headers-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:kernel-kdump-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-0:2.6.32-131.2.1.el6.x86_64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.i686", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.ppc64", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.s390x", "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.2.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: cifs oops when creating file with O_DIRECT set" } ] }
gsd-2011-1771
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-1771", "description": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.", "id": "GSD-2011-1771", "references": [ "https://www.suse.com/security/cve/CVE-2011-1771.html", "https://access.redhat.com/errata/RHSA-2011:0836", "https://linux.oracle.com/cve/CVE-2011-1771.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-1771" ], "details": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.", "id": "GSD-2011-1771", "modified": "2023-12-13T01:19:08.655966Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd" }, { "name": "http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2" }, { "name": "http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2" }, { "name": "http://securityreason.com/securityalert/8367", "refsource": "MISC", "url": "http://securityreason.com/securityalert/8367" }, { "name": "http://www.openwall.com/lists/oss-security/2011/05/09/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2011/05/09/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=703016", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.6.39", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1771" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-cifs] 20110405 Repeatable crash in 2.6.38 related to O_DIRECT", "refsource": "MLIST", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://marc.info/?l=linux-cifs\u0026m=130204357001849\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=703016", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703016" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "name": "[oss-security] 20110509 CVE-2011-1771 kernel: cifs oops when creating file with O_DIRECT set", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2011/05/09/2" }, { "name": "[linux-cifs] 20110405 Re: Repeatable crash in 2.6.38 related to O_DIRECT", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=linux-cifs\u0026m=130204730006155\u0026w=2" }, { "name": "8367", "refsource": "SREASON", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/8367" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-13T04:30Z", "publishedDate": "2011-09-06T16:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.