Action not permitted
Modal body text goes here.
cve-2004-1137
Vulnerability from cvelistv5
Published
2004-12-15 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:00.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11144", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "20041214 [USN-38-1] Linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "SUSE-SA:2004:044", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_44_kernel.html" }, { "name": "RHSA-2005:092", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "CLA-2005:930", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "name": "linux-igmpmarksources-dos(18482)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482" }, { "name": "linux-ipmcsource-code-execution(18481)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:11144", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "20041214 [USN-38-1] Linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "SUSE-SA:2004:044", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_44_kernel.html" }, { "name": "RHSA-2005:092", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "CLA-2005:930", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "name": "linux-igmpmarksources-dos(18482)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482" }, { "name": "linux-ipmcsource-code-execution(18481)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11144", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "20041214 [USN-38-1] Linux kernel vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "SUSE-SA:2004:044", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_44_kernel.html" }, { "name": "RHSA-2005:092", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "CLA-2005:930", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", "refsource": "MISC", "url": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "name": "linux-igmpmarksources-dos(18482)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482" }, { "name": "linux-ipmcsource-code-execution(18481)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1137", "datePublished": "2004-12-15T05:00:00", "dateReserved": "2004-12-06T00:00:00", "dateUpdated": "2024-08-08T00:39:00.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-1137\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-01-10T05:00:00.000\",\"lastModified\":\"2024-11-20T23:50:11.547\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E244C37-E366-482E-9173-9376D0839839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F96BB9-6509-4F1E-9590-E55EE8C6F992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*\",\"matchCriteriaId\":\"12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"718D4631-440E-4783-8966-B2A2D3EF89B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6111EDDB-065F-4AD1-925C-E0A3C1DE26AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A2F7E7-0C51-43F2-BCEA-01FF738971D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015F57A-1E3B-42D2-9D12-F695078EFB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"467721EE-5130-46C5-BBB7-0F4878F3F171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"171257E7-12C5-4283-88F7-FFE643995563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"0887E02F-9F36-41F0-9F75-060B8414D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D77F8919-4064-4EA5-A948-76178EA21F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7C423D-23DE-4C7B-A518-66F87E041925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA1382E-71B0-4E65-A310-716A244F4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"824BBD31-8F3B-4F05-981B-ABF662BBF5F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"388A5C99-1F60-4C20-9AE5-6E73E5A3F819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888F8D7-15C2-4435-BB3C-8674DFAF0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29439AD0-EB8D-4675-A77A-6548FF27ADA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27AADF6-1605-47FC-8C4D-87827A578A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42F4080-A76F-4D17-85E2-CD2D2E4D0450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6968EF1D-7CC5-430D-866D-206F66486F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E6F5C5-BF74-4C10-830A-F232D528D290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD8E4AE-FEF7-4CE2-B338-4F766921593F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8B50A-73F6-4FCF-A81F-FB624FBA7143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D27D843-2DA7-4481-857C-09FDC4FBD45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB93128-2743-4668-8C48-9B7282D4A672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA592BC-5846-4FC1-B2A7-13E622705DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FE15BF-91C7-452A-BE1B-7EC9632421C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C1923C-D9C4-400D-9F0F-20B519EEC9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51913F9-FC7D-450A-9A82-5084AA74A5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62E02D5-9EEE-439B-A510-BEEE28A9F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02278C07-E649-427D-9E5C-F1738A01BCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC53528-A67F-42DF-B8DA-778A65893F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"6E94583A-5184-462E-9FC4-57B35DA06DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"E905FAAD-37B6-4DD0-A752-2974F8336273\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://isec.pl/vulnerabilities/isec-0018-igmp.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_44_kernel.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-092.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2336\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18481\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18482\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://isec.pl/vulnerabilities/isec-0018-igmp.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_44_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-092.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18482\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2005_092
Vulnerability from csaf_redhat
Published
2005-02-18 17:20
Modified
2024-11-21 23:33
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues are now available
for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This advisory includes fixes for several security issues:
iSEC Security Research discovered multiple vulnerabilities in the IGMP
functionality. These flaws could allow a local user to cause a denial of
service (crash) or potentially gain privileges. Where multicast
applications are being used on a system, these flaws may also allow remote
users to cause a denial of service. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to
this issue.
iSEC Security Research discovered a flaw in the page fault handler code
that could lead to local users gaining elevated (root) privileges on
multiprocessor machines. (CAN-2005-0001)
iSEC Security Research discovered a VMA handling flaw in the uselib(2)
system call of the Linux kernel. A local user could make use of this
flaw to gain elevated (root) privileges. (CAN-2004-1235)
A flaw affecting the OUTS instruction on the AMD64 and Intel EM64T
architecture was discovered. A local user could use this flaw to write to
privileged IO ports. (CAN-2005-0204)
The Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not
properly check the DMA lock, which could allow remote attackers or local
users to cause a denial of service (X Server crash) or possibly modify the
video output. (CAN-2004-1056)
OGAWA Hirofumi discovered incorrect tables sizes being used in the
filesystem Native Language Support ASCII translation table. This could
lead to a denial of service (system crash). (CAN-2005-0177)
Michael Kerrisk discovered a flaw in the 2.6.9 kernel which allows users to
unlock arbitrary shared memory segments. This flaw could lead to
applications not behaving as expected. (CAN-2005-0176)
Improvements in the POSIX signal and tty standards compliance exposed
a race condition. This flaw can be triggered accidentally by threaded
applications or deliberately by a malicious user and can result in a
denial of service (crash) or in occasional cases give access to a small
random chunk of kernel memory. (CAN-2005-0178)
The PaX team discovered a flaw in mlockall introduced in the 2.6.9 kernel.
An unprivileged user could use this flaw to cause a denial of service
(CPU and memory consumption or crash). (CAN-2005-0179)
Brad Spengler discovered multiple flaws in sg_scsi_ioctl in the 2.6 kernel.
An unprivileged user may be able to use this flaw to cause a denial of
service (crash) or possibly other actions. (CAN-2005-0180)
Kirill Korotaev discovered a missing access check regression in the Red Hat
Enterprise Linux 4 kernel 4GB/4GB split patch. On systems using the
hugemem kernel, a local unprivileged user could use this flaw to cause a
denial of service (crash). (CAN-2005-0090)
A flaw in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch can
allow syscalls to read and write arbitrary kernel memory. On systems using
the hugemem kernel, a local unprivileged user could use this flaw to gain
privileges. (CAN-2005-0091)
An additional flaw in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split
patch was discovered. On x86 systems using the hugemem kernel, a local
unprivileged user may be able to use this flaw to cause a denial of service
(crash). (CAN-2005-0092)
All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\niSEC Security Research discovered multiple vulnerabilities in the IGMP\nfunctionality. These flaws could allow a local user to cause a denial of\nservice (crash) or potentially gain privileges. Where multicast\napplications are being used on a system, these flaws may also allow remote\nusers to cause a denial of service. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. (CAN-2005-0001)\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. (CAN-2004-1235)\n\nA flaw affecting the OUTS instruction on the AMD64 and Intel EM64T\narchitecture was discovered. A local user could use this flaw to write to\nprivileged IO ports. (CAN-2005-0204)\n\nThe Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not\nproperly check the DMA lock, which could allow remote attackers or local\nusers to cause a denial of service (X Server crash) or possibly modify the\nvideo output. (CAN-2004-1056)\n\nOGAWA Hirofumi discovered incorrect tables sizes being used in the\nfilesystem Native Language Support ASCII translation table. This could\nlead to a denial of service (system crash). (CAN-2005-0177)\n\nMichael Kerrisk discovered a flaw in the 2.6.9 kernel which allows users to\nunlock arbitrary shared memory segments. This flaw could lead to\napplications not behaving as expected. (CAN-2005-0176)\n\nImprovements in the POSIX signal and tty standards compliance exposed\na race condition. This flaw can be triggered accidentally by threaded\napplications or deliberately by a malicious user and can result in a\ndenial of service (crash) or in occasional cases give access to a small\nrandom chunk of kernel memory. (CAN-2005-0178)\n\nThe PaX team discovered a flaw in mlockall introduced in the 2.6.9 kernel.\nAn unprivileged user could use this flaw to cause a denial of service\n(CPU and memory consumption or crash). (CAN-2005-0179)\n\nBrad Spengler discovered multiple flaws in sg_scsi_ioctl in the 2.6 kernel.\nAn unprivileged user may be able to use this flaw to cause a denial of\nservice (crash) or possibly other actions. (CAN-2005-0180)\n\nKirill Korotaev discovered a missing access check regression in the Red Hat\nEnterprise Linux 4 kernel 4GB/4GB split patch. On systems using the\nhugemem kernel, a local unprivileged user could use this flaw to cause a\ndenial of service (crash). (CAN-2005-0090)\n\nA flaw in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch can\nallow syscalls to read and write arbitrary kernel memory. On systems using\nthe hugemem kernel, a local unprivileged user could use this flaw to gain\nprivileges. (CAN-2005-0091)\n\nAn additional flaw in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split\npatch was discovered. On x86 systems using the hugemem kernel, a local\nunprivileged user may be able to use this flaw to cause a denial of service\n(crash). (CAN-2005-0092)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:092", "url": "https://access.redhat.com/errata/RHSA-2005:092" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0018-igmp.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "142670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142670" }, { "category": "external", "summary": "144131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144131" }, { "category": "external", "summary": "144136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144136" }, { "category": "external", "summary": "144391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144391" }, { "category": "external", "summary": "144412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144412" }, { "category": "external", "summary": "144471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144471" }, { "category": "external", "summary": "144522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144522" }, { "category": "external", "summary": "144528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144528" }, { "category": "external", "summary": "144532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144532" }, { "category": "external", "summary": "144658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144658" }, { "category": "external", "summary": "146083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146083" }, { "category": "external", "summary": "146095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146095" }, { "category": "external", "summary": "146101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_092.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:33:57+00:00", "generator": { "date": "2024-11-21T23:33:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:092", "initial_release_date": "2005-02-18T17:20:00+00:00", "revision_history": [ { "date": "2005-02-18T17:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-02-18T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:33:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.ia64", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64", "product_id": "kernel-0:2.6.9-5.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.src", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.src", "product_id": "kernel-0:2.6.9-5.0.3.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "product_id": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-5.0.3.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.ppc64", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64", "product_id": "kernel-0:2.6.9-5.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.s390x", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x", "product_id": "kernel-0:2.6.9-5.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.s390", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.s390", "product_id": "kernel-0:2.6.9-5.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-1056", "discovery_date": "2004-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617358" } ], "notes": [ { "category": "description", "text": "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1056" }, { "category": "external", "summary": "RHBZ#1617358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1056", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1056" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1137", "discovery_date": "2004-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617372" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1137" }, { "category": "external", "summary": "RHBZ#1617372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1137", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0090", "discovery_date": "2005-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617452" } ], "notes": [ { "category": "description", "text": "A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an \"access check,\" which allows local users to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0090" }, { "category": "external", "summary": "RHBZ#1617452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617452" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0090", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0090" } ], "release_date": "2005-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0091", "discovery_date": "2005-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617453" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0091" }, { "category": "external", "summary": "RHBZ#1617453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0091" } ], "release_date": "2005-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0092", "discovery_date": "2005-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617454" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0092" }, { "category": "external", "summary": "RHBZ#1617454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0092", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0092" } ], "release_date": "2005-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0176", "discovery_date": "2005-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617481" } ], "notes": [ { "category": "description", "text": "The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0176" }, { "category": "external", "summary": "RHBZ#1617481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617481" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0176", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0176" } ], "release_date": "2005-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0177", "discovery_date": "2005-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617482" } ], "notes": [ { "category": "description", "text": "nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0177" }, { "category": "external", "summary": "RHBZ#1617482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0177" } ], "release_date": "2005-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0178", "discovery_date": "2005-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617483" } ], "notes": [ { "category": "description", "text": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0178" }, { "category": "external", "summary": "RHBZ#1617483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0178", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0178" } ], "release_date": "2005-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0179", "discovery_date": "2005-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617484" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0179" }, { "category": "external", "summary": "RHBZ#1617484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0179", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0179" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0180", "discovery_date": "2005-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617485" } ], "notes": [ { "category": "description", "text": "Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0180" }, { "category": "external", "summary": "RHBZ#1617485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0180", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0180" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0204", "discovery_date": "2005-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617491" } ], "notes": [ { "category": "description", "text": "Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0204" }, { "category": "external", "summary": "RHBZ#1617491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617491" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204" } ], "release_date": "2005-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2004_689
Vulnerability from csaf_redhat
Published
2004-12-23 20:47
Modified
2024-11-21 23:27
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in Red Hat
Enterprise Linux 3 are now available.
Details
The Linux kernel handles the basic functions of the operating system.
This advisory includes fixes for several security issues:
Petr Vandrovec discovered a flaw in the 32bit emulation code affecting the
Linux 2.4 kernel on the AMD64 architecture. A local attacker could use
this flaw to gain privileges. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-1144 to this issue.
ISEC security research discovered multiple vulnerabilities in the IGMP
functionality which was backported in the Red Hat Enterprise Linux 3
kernels. These flaws could allow a local user to cause a denial of
service (crash) or potentially gain privileges. Where multicast
applications are being used on a system, these flaws may also allow remote
users to cause a denial of service. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to
this issue.
ISEC security research and Georgi Guninski independantly discovered a flaw
in the scm_send function in the auxiliary message layer. A local user
could create a carefully crafted auxiliary message which could cause a
denial of service (system hang). The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.
A floating point information leak was discovered in the ia64 architecture
context switch code. A local user could use this flaw to read register
values of other processes by setting the MFH bit. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2004-0565 to this issue.
Kirill Korotaev found a flaw in load_elf_binary affecting kernels prior to
2.4.26. A local user could create a carefully crafted binary in such a
way that it would cause a denial of service (system crash). The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2004-1234 to this issue.
These packages also fix issues in the io_edgeport driver, and a memory leak
in ip_options_get.
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 3 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\nPetr Vandrovec discovered a flaw in the 32bit emulation code affecting the\nLinux 2.4 kernel on the AMD64 architecture. A local attacker could use\nthis flaw to gain privileges. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1144 to this issue.\n\nISEC security research discovered multiple vulnerabilities in the IGMP\nfunctionality which was backported in the Red Hat Enterprise Linux 3\nkernels. These flaws could allow a local user to cause a denial of\nservice (crash) or potentially gain privileges. Where multicast\napplications are being used on a system, these flaws may also allow remote\nusers to cause a denial of service. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to\nthis issue.\n\nISEC security research and Georgi Guninski independantly discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nA floating point information leak was discovered in the ia64 architecture\ncontext switch code. A local user could use this flaw to read register\nvalues of other processes by setting the MFH bit. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-0565 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver, and a memory leak\nin ip_options_get.\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:689", "url": "https://access.redhat.com/errata/RHSA-2004:689" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "124734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124734" }, { "category": "external", "summary": "126126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126126" }, { "category": "external", "summary": "142729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142729" }, { "category": "external", "summary": "142748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142748" }, { "category": "external", "summary": "142964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142964" }, { "category": "external", "summary": "142965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142965" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_689.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:30+00:00", "generator": { "date": "2024-11-21T23:27:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:689", "initial_release_date": "2004-12-23T20:47:00+00:00", "revision_history": [ { "date": "2004-12-23T20:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-23T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.1.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.1.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.src", "product_id": "kernel-0:2.4.21-27.0.1.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0565", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617231" } ], "notes": [ { "category": "description", "text": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0565" }, { "category": "external", "summary": "RHBZ#1617231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617231" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0565", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565" } ], "release_date": "2004-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1137", "discovery_date": "2004-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617372" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1137" }, { "category": "external", "summary": "RHBZ#1617372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1137", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1144", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617379" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1144" }, { "category": "external", "summary": "RHBZ#1617379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1144", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1144" } ], "release_date": "2004-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
gsd-2004-1137
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2004-1137", "description": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "id": "GSD-2004-1137", "references": [ "https://www.suse.com/security/cve/CVE-2004-1137.html", "https://access.redhat.com/errata/RHSA-2005:092", "https://access.redhat.com/errata/RHSA-2004:689", "https://packetstormsecurity.com/files/cve/CVE-2004-1137" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-1137" ], "details": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "id": "GSD-2004-1137", "modified": "2023-12-13T01:22:56.282753Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11144", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "20041214 [USN-38-1] Linux kernel vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "SUSE-SA:2004:044", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_44_kernel.html" }, { "name": "RHSA-2005:092", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "CLA-2005:930", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", "refsource": "MISC", "url": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "name": "linux-igmpmarksources-dos(18482)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482" }, { "name": "linux-ipmcsource-code-execution(18481)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1137" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", "refsource": "MISC", "tags": [], "url": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "name": "FLSA:2336", "refsource": "FEDORA", "tags": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "RHSA-2005:092", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "CLA-2005:930", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "SUSE-SA:2004:044", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2004_44_kernel.html" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "20041214 [USN-38-1] Linux kernel vulnerabilities", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2" }, { "name": "linux-igmpmarksources-dos(18482)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482" }, { "name": "linux-ipmcsource-code-execution(18481)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481" }, { "name": "oval:org.mitre.oval:def:11144", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-05-03T01:29Z", "publishedDate": "2005-01-10T05:00Z" } } }
ghsa-vqwc-f978-m55f
Vulnerability from github
Published
2022-04-29 02:59
Modified
2022-04-29 02:59
Details
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
{ "affected": [], "aliases": [ "CVE-2004-1137" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-01-10T05:00:00Z", "severity": "HIGH" }, "details": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "id": "GHSA-vqwc-f978-m55f", "modified": "2022-04-29T02:59:03Z", "published": "2022-04-29T02:59:03Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137" }, { "type": "WEB", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "type": "WEB", "url": "http://isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=110306397320336\u0026w=2" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2004_44_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.