Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-4508 (GCVE-0-2014-4508)
Vulnerability from cvelistv5 – Published: 2014-06-23 10:00 – Updated: 2024-08-06 11:20- n/a
| URL | Tags |
|---|---|
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://www.openwall.com/lists/oss-security/2014/0… | mailing-listx_refsource_MLIST |
| http://openwall.com/lists/oss-security/2014/06/20/1 | mailing-listx_refsource_MLIST |
| http://www.ubuntu.com/usn/USN-2334-1 | vendor-advisoryx_refsource_UBUNTU |
| https://www.kernel.org/pub/linux/kernel/v3.x/Chan… | x_refsource_CONFIRM |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://secunia.com/advisories/60564 | third-party-advisoryx_refsource_SECUNIA |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://www.securityfocus.com/bid/68126 | vdb-entryx_refsource_BID |
| http://article.gmane.org/gmane.linux.kernel/1726110 | mailing-listx_refsource_MLIST |
| http://secunia.com/advisories/58964 | third-party-advisoryx_refsource_SECUNIA |
| http://www.openwall.com/lists/oss-security/2020/11/12/3 | mailing-listx_refsource_MLIST |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:20:26.135Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "SUSE-SU-2014:1316",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"name": "[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"name": "[oss-security] 20140619 CVE request: Another Linux syscall auditing bug",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"name": "USN-2334-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"name": "SUSE-SU-2014:1319",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"name": "60564",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60564"
},
{
"name": "openSUSE-SU-2015:0566",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "68126",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/68126"
},
{
"name": "[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"name": "58964",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/58964"
},
{
"name": "[oss-security] 20201112 CVE-2014-4508",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-06-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-12T21:06:12.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "SUSE-SU-2014:1316",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"name": "[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"name": "[oss-security] 20140619 CVE request: Another Linux syscall auditing bug",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"name": "USN-2334-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"name": "SUSE-SU-2014:1319",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"name": "60564",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60564"
},
{
"name": "openSUSE-SU-2015:0566",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "68126",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/68126"
},
{
"name": "[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"name": "58964",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/58964"
},
{
"name": "[oss-security] 20201112 CVE-2014-4508",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-4508",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2014:1316",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"name": "[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"name": "[oss-security] 20140619 CVE request: Another Linux syscall auditing bug",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"name": "USN-2334-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61",
"refsource": "CONFIRM",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"name": "SUSE-SU-2014:1319",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"name": "60564",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60564"
},
{
"name": "openSUSE-SU-2015:0566",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "68126",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68126"
},
{
"name": "[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"name": "58964",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58964"
},
{
"name": "[oss-security] 20201112 CVE-2014-4508",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-4508",
"datePublished": "2014-06-23T10:00:00.000Z",
"dateReserved": "2014-06-20T00:00:00.000Z",
"dateUpdated": "2024-08-06T11:20:26.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2014-4508",
"date": "2026-05-22",
"epss": "0.00043",
"percentile": "0.13155"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.15.1\", \"matchCriteriaId\": \"F86ACFC2-671C-44BB-84C6-ED6406577186\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.\"}, {\"lang\": \"es\", \"value\": \"arch/x86/kernel/entry_32.S en el kernel de Linux hasta 3.15.1 en plataformas de 32-bit x86, cuando la auditoria de llamadas de sistema est\\u00e1 habilitada y la etiqueta de la funcionalidad de la CPU sep est\\u00e1 configurada, permite a usuarios locales causar una denegaci\\u00f3n de servicio (OOPS y ca\\u00edda del sistema) a trav\\u00e9s de un n\\u00famero de llamada de sistema inv\\u00e1lido, tal y como fue demostrado por el n\\u00famero 1000.\"}]",
"id": "CVE-2014-4508",
"lastModified": "2024-11-21T02:10:19.807",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.7, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.4, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-06-23T11:21:20.687",
"references": "[{\"url\": \"http://article.gmane.org/gmane.linux.kernel/1726110\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://openwall.com/lists/oss-security/2014/06/20/1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/58964\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/60564\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2014/06/20/10\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2020/11/12/3\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/68126\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2334-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://article.gmane.org/gmane.linux.kernel/1726110\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://openwall.com/lists/oss-security/2014/06/20/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/58964\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/60564\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2014/06/20/10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2020/11/12/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/68126\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2334-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-4508\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-06-23T11:21:20.687\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.\"},{\"lang\":\"es\",\"value\":\"arch/x86/kernel/entry_32.S en el kernel de Linux hasta 3.15.1 en plataformas de 32-bit x86, cuando la auditoria de llamadas de sistema est\u00e1 habilitada y la etiqueta de la funcionalidad de la CPU sep est\u00e1 configurada, permite a usuarios locales causar una denegaci\u00f3n de servicio (OOPS y ca\u00edda del sistema) a trav\u00e9s de un n\u00famero de llamada de sistema inv\u00e1lido, tal y como fue demostrado por el n\u00famero 1000.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.15.1\",\"matchCriteriaId\":\"F86ACFC2-671C-44BB-84C6-ED6406577186\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"}]}]}],\"references\":[{\"url\":\"http://article.gmane.org/gmane.linux.kernel/1726110\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/06/20/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58964\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60564\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/06/20/10\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/11/12/3\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/68126\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2334-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://article.gmane.org/gmane.linux.kernel/1726110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/06/20/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60564\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/06/20/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/11/12/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/68126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2334-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2014-AVI-373
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 10.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-5045",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5045"
},
{
"name": "CVE-2014-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0206"
},
{
"name": "CVE-2014-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5077"
},
{
"name": "CVE-2014-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0155"
},
{
"name": "CVE-2014-0203",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0203"
},
{
"name": "CVE-2014-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4655"
},
{
"name": "CVE-2014-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0181"
},
{
"name": "CVE-2014-4171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4171"
},
{
"name": "CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"name": "CVE-2014-4014",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4014"
},
{
"name": "CVE-2014-3917",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3917"
},
{
"name": "CVE-2014-4667",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4667"
},
{
"name": "CVE-2014-4652",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4652"
},
{
"name": "CVE-2014-4027",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4027"
},
{
"name": "CVE-2014-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4656"
},
{
"name": "CVE-2014-4653",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4653"
},
{
"name": "CVE-2014-4654",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4654"
}
],
"links": [],
"reference": "CERTFR-2014-AVI-373",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau \u003cspan\nclass=\"textit\"\u003eLinux\u003c/span\u003e d\u0027\u003cspan class=\"textit\"\u003eUbuntu\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2332-1 du 02 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2332-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2334-1 du 02 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2334-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2337-1 du 02 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2337-1/"
}
]
}
CERTFR-2014-AVI-388
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Suse. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
SUSE Linux Enterprise Server 11 SP2 LTSS
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eSUSE Linux Enterprise Server 11 SP2 LTSS\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3144"
},
{
"name": "CVE-2014-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0055"
},
{
"name": "CVE-2013-4299",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4299"
},
{
"name": "CVE-2014-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5077"
},
{
"name": "CVE-2014-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1739"
},
{
"name": "CVE-2014-2706",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2706"
},
{
"name": "CVE-2014-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4655"
},
{
"name": "CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"name": "CVE-2014-2851",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2851"
},
{
"name": "CVE-2014-3917",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3917"
},
{
"name": "CVE-2014-4667",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4667"
},
{
"name": "CVE-2014-4652",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4652"
},
{
"name": "CVE-2014-4699",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4699"
},
{
"name": "CVE-2014-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3145"
},
{
"name": "CVE-2014-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4656"
},
{
"name": "CVE-2014-4653",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4653"
},
{
"name": "CVE-2014-4654",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4654"
},
{
"name": "CVE-2014-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0077"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2014:1105-1 du 09 septembre 2014",
"url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141105-1.html"
}
],
"reference": "CERTFR-2014-AVI-388",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux de\n\u003cspan class=\"textit\"\u003eSuse\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un d\u00e9ni de\nservice et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Suse",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2014:1105-1 du 09 septembre 2014",
"url": null
}
]
}
CERTFR-2021-AVI-040
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2020-16166",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16166"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-040",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Red Hat RHSA-2021:0184 du 19 janvier 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:0184"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Red Hat RHSA-2021:0181 du 19 janvier 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:0181"
}
]
}
CERTFR-2014-AVI-373
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 10.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-5045",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5045"
},
{
"name": "CVE-2014-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0206"
},
{
"name": "CVE-2014-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5077"
},
{
"name": "CVE-2014-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0155"
},
{
"name": "CVE-2014-0203",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0203"
},
{
"name": "CVE-2014-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4655"
},
{
"name": "CVE-2014-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0181"
},
{
"name": "CVE-2014-4171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4171"
},
{
"name": "CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"name": "CVE-2014-4014",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4014"
},
{
"name": "CVE-2014-3917",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3917"
},
{
"name": "CVE-2014-4667",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4667"
},
{
"name": "CVE-2014-4652",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4652"
},
{
"name": "CVE-2014-4027",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4027"
},
{
"name": "CVE-2014-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4656"
},
{
"name": "CVE-2014-4653",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4653"
},
{
"name": "CVE-2014-4654",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4654"
}
],
"links": [],
"reference": "CERTFR-2014-AVI-373",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau \u003cspan\nclass=\"textit\"\u003eLinux\u003c/span\u003e d\u0027\u003cspan class=\"textit\"\u003eUbuntu\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2332-1 du 02 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2332-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2334-1 du 02 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2334-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-2337-1 du 02 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2337-1/"
}
]
}
CERTFR-2014-AVI-388
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Suse. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
SUSE Linux Enterprise Server 11 SP2 LTSS
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eSUSE Linux Enterprise Server 11 SP2 LTSS\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3144"
},
{
"name": "CVE-2014-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0055"
},
{
"name": "CVE-2013-4299",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4299"
},
{
"name": "CVE-2014-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5077"
},
{
"name": "CVE-2014-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1739"
},
{
"name": "CVE-2014-2706",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2706"
},
{
"name": "CVE-2014-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4655"
},
{
"name": "CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"name": "CVE-2014-2851",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2851"
},
{
"name": "CVE-2014-3917",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3917"
},
{
"name": "CVE-2014-4667",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4667"
},
{
"name": "CVE-2014-4652",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4652"
},
{
"name": "CVE-2014-4699",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4699"
},
{
"name": "CVE-2014-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3145"
},
{
"name": "CVE-2014-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4656"
},
{
"name": "CVE-2014-4653",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4653"
},
{
"name": "CVE-2014-4654",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4654"
},
{
"name": "CVE-2014-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0077"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2014:1105-1 du 09 septembre 2014",
"url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141105-1.html"
}
],
"reference": "CERTFR-2014-AVI-388",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux de\n\u003cspan class=\"textit\"\u003eSuse\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un d\u00e9ni de\nservice et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Suse",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2014:1105-1 du 09 septembre 2014",
"url": null
}
]
}
CERTFR-2021-AVI-040
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2020-16166",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16166"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-040",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Red Hat RHSA-2021:0184 du 19 janvier 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:0184"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Red Hat RHSA-2021:0181 du 19 janvier 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:0181"
}
]
}
FKIE_CVE-2014-4508
Vulnerability from fkie_nvd - Published: 2014-06-23 11:21 - Updated: 2026-05-06 22:30| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| canonical | ubuntu_linux | 12.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F86ACFC2-671C-44BB-84C6-ED6406577186",
"versionEndIncluding": "3.15.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000."
},
{
"lang": "es",
"value": "arch/x86/kernel/entry_32.S en el kernel de Linux hasta 3.15.1 en plataformas de 32-bit x86, cuando la auditoria de llamadas de sistema est\u00e1 habilitada y la etiqueta de la funcionalidad de la CPU sep est\u00e1 configurada, permite a usuarios locales causar una denegaci\u00f3n de servicio (OOPS y ca\u00edda del sistema) a trav\u00e9s de un n\u00famero de llamada de sistema inv\u00e1lido, tal y como fue demostrado por el n\u00famero 1000."
}
],
"id": "CVE-2014-4508",
"lastModified": "2026-05-06T22:30:45.220",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-23T11:21:20.687",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/58964"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60564"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/68126"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/58964"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60564"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/68126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-J8J3-QQ6W-FXVV
Vulnerability from github – Published: 2022-05-13 01:13 – Updated: 2022-05-13 01:13arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
{
"affected": [],
"aliases": [
"CVE-2014-4508"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-06-23T11:21:00Z",
"severity": "MODERATE"
},
"details": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.",
"id": "GHSA-j8j3-qq6w-fxvv",
"modified": "2022-05-13T01:13:34Z",
"published": "2022-05-13T01:13:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4508"
},
{
"type": "WEB",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"type": "WEB",
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/58964"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60564"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/68126"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2334-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2014-4508
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-4508",
"description": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.",
"id": "GSD-2014-4508",
"references": [
"https://www.suse.com/security/cve/CVE-2014-4508.html",
"https://access.redhat.com/errata/RHSA-2021:0181",
"https://ubuntu.com/security/CVE-2014-4508",
"https://advisories.mageia.org/CVE-2014-4508.html",
"https://alas.aws.amazon.com/cve/html/CVE-2014-4508.html",
"https://linux.oracle.com/cve/CVE-2014-4508.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-4508"
],
"details": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.",
"id": "GSD-2014-4508",
"modified": "2023-12-13T01:22:45.541176Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-4508",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SU-2014:1316",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"name": "[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"name": "[oss-security] 20140619 CVE request: Another Linux syscall auditing bug",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"name": "USN-2334-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61",
"refsource": "CONFIRM",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"name": "SUSE-SU-2014:1319",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"name": "60564",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60564"
},
{
"name": "openSUSE-SU-2015:0566",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "68126",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68126"
},
{
"name": "[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"name": "58964",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58964"
},
{
"name": "[oss-security] 20201112 CVE-2014-4508",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.15.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-4508"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20140619 CVE request: Another Linux syscall auditing bug",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://openwall.com/lists/oss-security/2014/06/20/1"
},
{
"name": "[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2014/06/20/10"
},
{
"name": "[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "http://article.gmane.org/gmane.linux.kernel/1726110"
},
{
"name": "58964",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/58964"
},
{
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"
},
{
"name": "60564",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60564"
},
{
"name": "USN-2334-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2334-1"
},
{
"name": "SUSE-SU-2014:1316",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
},
{
"name": "SUSE-SU-2014:1319",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
},
{
"name": "openSUSE-SU-2015:0566",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "68126",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/68126"
},
{
"name": "[oss-security] 20201112 CVE-2014-4508",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/3"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2020-11-12T22:15Z",
"publishedDate": "2014-06-23T11:21Z"
}
}
}
RHSA-2021:0181
Vulnerability from csaf_redhat - Published: 2021-01-19 09:33 - Updated: 2025-11-21 18:19A flaw was found in the Linux kernel’s system-call auditing support(CONFIG_AUDITSYSCALL) for 32-bit platforms. It is vulnerable to a crash caused by erroneous handling of bad system call numerals. This issue occurs during syscall(2) calls if system-call auditing is enabled on the system. This flaw allows an unprivileged user or process to crash the system kernel, resulting in a denial of service. The highest threat from this vulnerability is system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-ELS:kernel-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-0:2.6.32-754.36.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:perf-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:perf-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:perf-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: x86_32: BUG in syscall auditing (CVE-2014-4508)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0181",
"url": "https://access.redhat.com/errata/RHSA-2021:0181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1111590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111590"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0181.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:50+00:00",
"generator": {
"date": "2025-11-21T18:19:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:0181",
"initial_release_date": "2021-01-19T09:33:25+00:00",
"revision_history": [
{
"date": "2021-01-19T09:33:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-19T09:33:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.36.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.36.1.el6.src",
"product_id": "kernel-0:2.6.32-754.36.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.36.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "perf-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.36.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.36.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.36.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.36.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.36.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.36.1.el6.i686",
"product_id": "perf-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.36.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.36.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.36.1.el6.i686",
"product_id": "python-perf-0:2.6.32-754.36.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.36.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.36.1.el6.s390x",
"product_id": "perf-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.36.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.36.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.36.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.36.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.36.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.36.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.36.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.36.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.36.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.36.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.36.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-4508",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"discovery_date": "2014-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1111590"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s system-call auditing support(CONFIG_AUDITSYSCALL) for 32-bit platforms. It is vulnerable to a crash caused by erroneous handling of bad system call numerals. This issue occurs during syscall(2) calls if system-call auditing is enabled on the system. This flaw allows an unprivileged user or process to crash the system kernel, resulting in a denial of service. The highest threat from this vulnerability is system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: x86_32: BUG in syscall auditing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 7, 8 and Red Hat Enterprise MRG 2.\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6. Future kernel updates for Red Hat Enterprise Linux 6 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4508"
},
{
"category": "external",
"summary": "RHBZ#1111590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111590"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4508"
},
{
"category": "external",
"summary": "https://git.kernel.org/linus/554086d85e71f30abe46fc014fea31929a7c6a8a",
"url": "https://git.kernel.org/linus/554086d85e71f30abe46fc014fea31929a7c6a8a"
},
{
"category": "external",
"summary": "https://git.kernel.org/linus/8142b215501f8b291a108a202b3a053a265b03dd",
"url": "https://git.kernel.org/linus/8142b215501f8b291a108a202b3a053a265b03dd"
},
{
"category": "external",
"summary": "https://git.kernel.org/linus/fb21b84e7f809ef04b1e5aed5d463cf0d4866638",
"url": "https://git.kernel.org/linus/fb21b84e7f809ef04b1e5aed5d463cf0d4866638"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/12/3",
"url": "https://www.openwall.com/lists/oss-security/2020/11/12/3"
}
],
"release_date": "2014-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-19T09:33:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0181"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.36.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.36.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.36.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: x86_32: BUG in syscall auditing"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.