Action not permitted
Modal body text goes here.
cve-2004-1235
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:46:12.034Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "RHSA-2005:017", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/7804" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "RHSA-2005:016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20162" }, { "name": "RHSA-2005:043", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "RHSA-2005:092", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "FEDORA-2005-014", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/7805" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "CLA-2005:930", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "SUSE-SR:2005:001", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "12190", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12190" }, { "name": "linux-uselib-gain-privileges(18800)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "name": "20050107 Linux kernel sys_uselib local root vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9567", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567" }, { "name": "FEDORA-2005-013", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/7806" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "RHSA-2005:017", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.securityfocus.com/advisories/7804" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "RHSA-2005:016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20162" }, { "name": "RHSA-2005:043", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "RHSA-2005:092", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "FEDORA-2005-014", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/advisories/7805" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "CLA-2005:930", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "SUSE-SR:2005:001", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "12190", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12190" }, { "name": "linux-uselib-gain-privileges(18800)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "name": "20050107 Linux kernel sys_uselib local root vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9567", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567" }, { "name": "FEDORA-2005-013", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/advisories/7806" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "http://www.securityfocus.com/advisories/7804", "refsource": "CONFIRM", "url": "http://www.securityfocus.com/advisories/7804" }, { "name": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", "refsource": "MISC", "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "RHSA-2005:016", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "RHSA-2005:092", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "FEDORA-2005-014", "refsource": "FEDORA", "url": "http://www.securityfocus.com/advisories/7805" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "CLA-2005:930", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "SUSE-SR:2005:001", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "12190", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12190" }, { "name": "linux-uselib-gain-privileges(18800)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "name": "20050107 Linux kernel sys_uselib local root vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9567", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567" }, { "name": "FEDORA-2005-013", "refsource": "FEDORA", "url": "http://www.securityfocus.com/advisories/7806" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1235", "datePublished": "2005-01-20T05:00:00", "dateReserved": "2004-12-15T00:00:00", "dateUpdated": "2024-08-08T00:46:12.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-1235\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-04-14T04:00:00.000\",\"lastModified\":\"2024-11-20T23:50:25.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.\"},{\"lang\":\"es\",\"value\":\"Condici\u00f3n de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n manipulando el descriptor WMA.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:C/I:C/A:C\",\"baseScore\":6.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":1.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D073442B-D7E7-4E07-AF2D-E22FE65B09A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E942E0E7-0808-479C-B061-66119EBA12E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E586558A-ABC3-42EB-8B4D-DC92A0D695E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B1272B-8B71-4D2D-A5E4-0E7828500C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C7B9C0-91A2-4529-B879-60DE043E719C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25F5CF2-F891-41CA-A40C-13966F72FDF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417958C-5321-41D6-9D1A-D16BF5511E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E244C37-E366-482E-9173-9376D0839839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F96BB9-6509-4F1E-9590-E55EE8C6F992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*\",\"matchCriteriaId\":\"12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"718D4631-440E-4783-8966-B2A2D3EF89B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6111EDDB-065F-4AD1-925C-E0A3C1DE26AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A2F7E7-0C51-43F2-BCEA-01FF738971D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015F57A-1E3B-42D2-9D12-F695078EFB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"467721EE-5130-46C5-BBB7-0F4878F3F171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"171257E7-12C5-4283-88F7-FFE643995563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"0887E02F-9F36-41F0-9F75-060B8414D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D77F8919-4064-4EA5-A948-76178EA21F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7C423D-23DE-4C7B-A518-66F87E041925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA1382E-71B0-4E65-A310-716A244F4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"824BBD31-8F3B-4F05-981B-ABF662BBF5F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"388A5C99-1F60-4C20-9AE5-6E73E5A3F819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888F8D7-15C2-4435-BB3C-8674DFAF0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29439AD0-EB8D-4675-A77A-6548FF27ADA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27AADF6-1605-47FC-8C4D-87827A578A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42F4080-A76F-4D17-85E2-CD2D2E4D0450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6968EF1D-7CC5-430D-866D-206F66486F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E6F5C5-BF74-4C10-830A-F232D528D290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD8E4AE-FEF7-4CE2-B338-4F766921593F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8B50A-73F6-4FCF-A81F-FB624FBA7143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D27D843-2DA7-4481-857C-09FDC4FBD45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB93128-2743-4668-8C48-9B7282D4A672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA592BC-5846-4FC1-B2A7-13E622705DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FE15BF-91C7-452A-BE1B-7EC9632421C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C1923C-D9C4-400D-9F0F-20B519EEC9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51913F9-FC7D-450A-9A82-5084AA74A5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62E02D5-9EEE-439B-A510-BEEE28A9F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02278C07-E649-427D-9E5C-F1738A01BCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AFD594E-48BA-4281-8DEE-306E3008ABB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC53528-A67F-42DF-B8DA-778A65893F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4177C378-7729-46AB-B49B-C6DAED3200E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3528DABD-B821-4D23-AE12-614A9CA92C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"9E661D58-18DF-4CCF-9892-F873618F4535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F0D201-B1DC-4024-AF77-A284673618F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"052E3862-BFB7-42E7-889D-8590AFA8EF37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB0B27C-04EA-426F-9016-7406BACD91DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*\",\"matchCriteriaId\":\"81B543F9-C209-46C2-B0AE-E14818A6992E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"DB89C970-DE94-4E09-A90A-077DB83AD156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"F9440B25-D206-4914-9557-B5F030890DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E9933557-3BCA-4D92-AD4F-27758A0D3347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"10A60552-15A5-4E95-B3CE-99A4B26260C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D74A418-50F0-42C0-ABBC-BBBE718FF025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C84296C-2C8A-4DCD-9751-52951F8BEA9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6996B14-925B-46B8-982F-3545328B506B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC80CF67-C51D-442C-9526-CFEDE84A6304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"9B502A61-44FB-4CD4-85BE-88D4ACCCA441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*\",\"matchCriteriaId\":\"C7EAAD04-D7C4-43DE-B488-1AAD014B503E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF3C-1379-4CBE-8FF5-DACD47834651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C55338-3372-413F-82E3-E1B476D6F41A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0E2D3B-B50A-46C2-BA1E-3E014DE91954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"F7446746-87B7-4BD3-AABF-1E0FAA8265AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFABFCE5-4F86-4AE8-9849-BC360AC72098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"6E94583A-5184-462E-9FC4-57B35DA06DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"E905FAAD-37B6-4DD0-A752-2974F8336273\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*\",\"matchCriteriaId\":\"C1A3B951-A1F8-4291-82FA-AB7922D13ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C0BD87-CE4B-49D2-89BE-EF282C43AD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E6C4A8-59F4-43EE-8413-E95289037598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE76357A-27E6-4D85-9AA0-1BB658C41568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56C5FDB-24E2-479D-87CA-164CD28567D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D982AE39-BB57-49E7-B5FE-5EF1ADE2F019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A35FC777-A34E-4C7B-9E93-8F17F3AD5180\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://isec.pl/vulnerabilities/isec-0021-uselib.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20162\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20163\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20338\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1067\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1069\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1070\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1082\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_01_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-043.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-092.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/advisories/7804\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/advisories/7805\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/advisories/7806\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/12190\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2005/0001/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2336\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18800\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://isec.pl/vulnerabilities/isec-0021-uselib.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20338\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1069\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1070\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_01_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-092.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/advisories/7804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/advisories/7805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/advisories/7806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/12190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2005/0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2005_017
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 2.1 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for the following security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue.\n\nA flaw was discovered where an executable could cause a VMA overlap leading\nto a crash. On Itanium systems, a local user could trigger this flaw by\ncreating a carefully crafted ELF binary. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2005-0003 to\nthis issue.\n\niSEC Security Research and Georgi Guninski independently discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver (CAN-2004-1017), a\nmemory leak in ip_options_get (CAN-2004-1335), and missing VM_IO\nflags in some drivers (CAN-2004-1057).\n\nOlaf Kirch discovered that the recent security fixes for cmsg_len handling\n(CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms. A patch to\ncorrect this issue is included.\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nAll Red Hat Enterprise Linux 2.1 users running Itanium are advised to\nupgrade their kernels to the packages listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:017", "url": "https://access.redhat.com/errata/RHSA-2005:017" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "137822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137822" }, { "category": "external", "summary": "142596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142596" }, { "category": "external", "summary": "142731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142731" }, { "category": "external", "summary": "142735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142735" }, { "category": "external", "summary": "143379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143379" }, { "category": "external", "summary": "144108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144108" }, { "category": "external", "summary": "144138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144138" }, { "category": "external", "summary": "144408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144408" }, { "category": "external", "summary": "144785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144785" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_017.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:40+00:00", "generator": { "date": "2024-11-21T23:27:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:017", "initial_release_date": "2005-01-21T15:41:00+00:00", "revision_history": [ { "date": "2005-01-21T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1057", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617359" } ], "notes": [ { "category": "description", "text": "Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1057" }, { "category": "external", "summary": "RHBZ#1617359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1057", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617430" } ], "notes": [ { "category": "description", "text": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0003" }, { "category": "external", "summary": "RHBZ#1617430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" } ], "release_date": "2004-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "title": "security flaw" } ] }
rhsa-2005_043
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 3 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\nA flaw was discovered where an executable could cause a VMA overlap leading\nto a crash. A local user could trigger this flaw by creating a carefully\ncrafted a.out binary on 32-bit systems or a carefully crafted ELF binary\non Itanium systems. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0003 to this issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue. A patch\nthat coincidentally fixed this issue was committed to the Update 4 kernel\nrelease in December 2004. Therefore Red Hat Enterprise Linux 3 kernels\nprovided by RHBA-2004:550 and subsequent updates are not vulnerable to\nthis issue.\n\nA flaw in the system call filtering code in the audit subsystem included\nin Red Hat Enterprise Linux 3 allowed a local user to cause a crash when\nauditing was enabled. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-1237 to this issue.\n\nOlaf Kirch discovered that the recent security fixes for cmsg_len handling\n(CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms such as\nAMD64 and Intel EM64T. A patch to correct this issue is included.\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:043", "url": "https://access.redhat.com/errata/RHSA-2005:043" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "132245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132245" }, { "category": "external", "summary": "141996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=141996" }, { "category": "external", "summary": "142091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142091" }, { "category": "external", "summary": "142442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142442" }, { "category": "external", "summary": "143866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143866" }, { "category": "external", "summary": "144048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144048" }, { "category": "external", "summary": "144134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144134" }, { "category": "external", "summary": "144784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144784" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_043.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:44+00:00", "generator": { "date": "2024-11-21T23:27:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:043", "initial_release_date": "2005-01-18T23:52:00+00:00", "revision_history": [ { "date": "2005-01-18T23:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-18T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.src", "product_id": "kernel-0:2.4.21-27.0.2.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1074", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617367" } ], "notes": [ { "category": "description", "text": "The binfmt functionality in the Linux kernel, when \"memory overcommit\" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1074" }, { "category": "external", "summary": "RHBZ#1617367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1074", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1074" } ], "release_date": "2004-11-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1237", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617399" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1237" }, { "category": "external", "summary": "RHBZ#1617399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1237", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1237" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1237", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1237" } ], "release_date": "2004-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617430" } ], "notes": [ { "category": "description", "text": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0003" }, { "category": "external", "summary": "RHBZ#1617430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" } ], "release_date": "2004-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "title": "security flaw" } ] }
rhsa-2005_016
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 2.1 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for the following security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue. \n\niSEC Security Research and Georgi Guninski independently discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver (CAN-2004-1017), a\nmemory leak in ip_options_get (CAN-2004-1335), and missing VM_IO\nflags in some drivers (CAN-2004-1057).\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:016", "url": "https://access.redhat.com/errata/RHSA-2005:016" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "137821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137821" }, { "category": "external", "summary": "142594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142594" }, { "category": "external", "summary": "142730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142730" }, { "category": "external", "summary": "142734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142734" }, { "category": "external", "summary": "143378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143378" }, { "category": "external", "summary": "144137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144137" }, { "category": "external", "summary": "144407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144407" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_016.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:36+00:00", "generator": { "date": "2024-11-21T23:27:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:016", "initial_release_date": "2005-01-21T15:37:00+00:00", "revision_history": [ { "date": "2005-01-21T15:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1057", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617359" } ], "notes": [ { "category": "description", "text": "Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1057" }, { "category": "external", "summary": "RHBZ#1617359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1057", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_092
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\niSEC Security Research discovered multiple vulnerabilities in the IGMP\nfunctionality. These flaws could allow a local user to cause a denial of\nservice (crash) or potentially gain privileges. Where multicast\napplications are being used on a system, these flaws may also allow remote\nusers to cause a denial of service. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. (CAN-2005-0001)\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. (CAN-2004-1235)\n\nA flaw affecting the OUTS instruction on the AMD64 and Intel EM64T\narchitecture was discovered. A local user could use this flaw to write to\nprivileged IO ports. (CAN-2005-0204)\n\nThe Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not\nproperly check the DMA lock, which could allow remote attackers or local\nusers to cause a denial of service (X Server crash) or possibly modify the\nvideo output. (CAN-2004-1056)\n\nOGAWA Hirofumi discovered incorrect tables sizes being used in the\nfilesystem Native Language Support ASCII translation table. This could\nlead to a denial of service (system crash). (CAN-2005-0177)\n\nMichael Kerrisk discovered a flaw in the 2.6.9 kernel which allows users to\nunlock arbitrary shared memory segments. This flaw could lead to\napplications not behaving as expected. (CAN-2005-0176)\n\nImprovements in the POSIX signal and tty standards compliance exposed\na race condition. This flaw can be triggered accidentally by threaded\napplications or deliberately by a malicious user and can result in a\ndenial of service (crash) or in occasional cases give access to a small\nrandom chunk of kernel memory. (CAN-2005-0178)\n\nThe PaX team discovered a flaw in mlockall introduced in the 2.6.9 kernel.\nAn unprivileged user could use this flaw to cause a denial of service\n(CPU and memory consumption or crash). (CAN-2005-0179)\n\nBrad Spengler discovered multiple flaws in sg_scsi_ioctl in the 2.6 kernel.\nAn unprivileged user may be able to use this flaw to cause a denial of\nservice (crash) or possibly other actions. (CAN-2005-0180)\n\nKirill Korotaev discovered a missing access check regression in the Red Hat\nEnterprise Linux 4 kernel 4GB/4GB split patch. On systems using the\nhugemem kernel, a local unprivileged user could use this flaw to cause a\ndenial of service (crash). (CAN-2005-0090)\n\nA flaw in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch can\nallow syscalls to read and write arbitrary kernel memory. On systems using\nthe hugemem kernel, a local unprivileged user could use this flaw to gain\nprivileges. (CAN-2005-0091)\n\nAn additional flaw in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split\npatch was discovered. On x86 systems using the hugemem kernel, a local\nunprivileged user may be able to use this flaw to cause a denial of service\n(crash). (CAN-2005-0092)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:092", "url": "https://access.redhat.com/errata/RHSA-2005:092" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0018-igmp.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0018-igmp.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "142670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142670" }, { "category": "external", "summary": "144131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144131" }, { "category": "external", "summary": "144136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144136" }, { "category": "external", "summary": "144391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144391" }, { "category": "external", "summary": "144412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144412" }, { "category": "external", "summary": "144471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144471" }, { "category": "external", "summary": "144522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144522" }, { "category": "external", "summary": "144528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144528" }, { "category": "external", "summary": "144532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144532" }, { "category": "external", "summary": "144658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144658" }, { "category": "external", "summary": "146083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146083" }, { "category": "external", "summary": "146095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146095" }, { "category": "external", "summary": "146101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_092.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:33:57+00:00", "generator": { "date": "2024-11-21T23:33:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:092", "initial_release_date": "2005-02-18T17:20:00+00:00", "revision_history": [ { "date": "2005-02-18T17:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-02-18T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:33:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.ia64", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64", "product_id": "kernel-0:2.6.9-5.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.src", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.src", "product_id": "kernel-0:2.6.9-5.0.3.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "product_id": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-5.0.3.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.ppc64", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64", "product_id": "kernel-0:2.6.9-5.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.s390x", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x", "product_id": "kernel-0:2.6.9-5.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "product_id": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-5.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-5.0.3.EL.s390", "product": { "name": "kernel-0:2.6.9-5.0.3.EL.s390", "product_id": "kernel-0:2.6.9-5.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-5.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-5.0.3.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-5.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-5.0.3.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-1056", "discovery_date": "2004-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617358" } ], "notes": [ { "category": "description", "text": "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1056" }, { "category": "external", "summary": "RHBZ#1617358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1056", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1056" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1137", "discovery_date": "2004-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617372" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1137" }, { "category": "external", "summary": "RHBZ#1617372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1137", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0090", "discovery_date": "2005-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617452" } ], "notes": [ { "category": "description", "text": "A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an \"access check,\" which allows local users to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0090" }, { "category": "external", "summary": "RHBZ#1617452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617452" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0090", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0090" } ], "release_date": "2005-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0091", "discovery_date": "2005-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617453" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0091" }, { "category": "external", "summary": "RHBZ#1617453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0091" } ], "release_date": "2005-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0092", "discovery_date": "2005-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617454" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0092" }, { "category": "external", "summary": "RHBZ#1617454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0092", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0092" } ], "release_date": "2005-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0176", "discovery_date": "2005-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617481" } ], "notes": [ { "category": "description", "text": "The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0176" }, { "category": "external", "summary": "RHBZ#1617481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617481" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0176", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0176" } ], "release_date": "2005-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0177", "discovery_date": "2005-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617482" } ], "notes": [ { "category": "description", "text": "nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0177" }, { "category": "external", "summary": "RHBZ#1617482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0177" } ], "release_date": "2005-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0178", "discovery_date": "2005-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617483" } ], "notes": [ { "category": "description", "text": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0178" }, { "category": "external", "summary": "RHBZ#1617483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0178", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0178" } ], "release_date": "2005-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0179", "discovery_date": "2005-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617484" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0179" }, { "category": "external", "summary": "RHBZ#1617484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0179", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0179" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0180", "discovery_date": "2005-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617485" } ], "notes": [ { "category": "description", "text": "Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0180" }, { "category": "external", "summary": "RHBZ#1617485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0180", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0180" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0204", "discovery_date": "2005-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617491" } ], "notes": [ { "category": "description", "text": "Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0204" }, { "category": "external", "summary": "RHBZ#1617491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617491" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204" } ], "release_date": "2005-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-02-18T17:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-0:2.6.9-5.0.3.EL.src", "4AS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-5.0.3.EL.src", "4Desktop:kernel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-0:2.6.9-5.0.3.EL.src", "4ES:kernel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-0:2.6.9-5.0.3.EL.src", "4WS:kernel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-5.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-5.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-5.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:092" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
ghsa-pxmj-v2v3-474h
Vulnerability from github
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
{ "affected": [], "aliases": [ "CVE-2004-1235" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-04-14T04:00:00Z", "severity": "MODERATE" }, "details": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "id": "GHSA-pxmj-v2v3-474h", "modified": "2022-04-29T02:59:13Z", "published": "2022-04-29T02:59:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" }, { "type": "WEB", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "type": "WEB", "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/20162" }, { "type": "WEB", "url": "http://secunia.com/advisories/20163" }, { "type": "WEB", "url": "http://secunia.com/advisories/20202" }, { "type": "WEB", "url": "http://secunia.com/advisories/20338" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/advisories/7804" }, { "type": "WEB", "url": "http://www.securityfocus.com/advisories/7805" }, { "type": "WEB", "url": "http://www.securityfocus.com/advisories/7806" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12190" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2005/0001" } ], "schema_version": "1.4.0", "severity": [] }
var-200501-0463
Vulnerability from variot
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Linux Kernel of (1) load_elf_library() function, (2) binfmt_aout() Functions include brk There is a flaw in the handling of the segment that causes a race condition.root You may get permission. Linux kernel is reported prone to a local privilege-escalation vulnerability. This issue arises in the 'uselib()' functions of the Linux binary-format loader as a result of a race condition. Successful exploitation of this vulnerability can allow a local attacker to gain elevated privileges on a vulnerable computer. The ELF and a.out loaders are reportedly affected by this vulnerability. The Linux kernel provides a binary format loader layer to load programs in different formats such as ELF or a.out or others, and the kernel also provides the sys_uselib() function to load corresponding binary programs. From the analysis of the uselib function of load_elf_library() in the binfmt_elf.c file, there is a problem in the processing of the BRK segment (VMA) of the library. This segment is established through current->mm->mmap_sem. When modifying the memory layout of the calling process\ '\' semaphore \'\' (semaphore) is not maintained, this can be used to mess with memory management and elevate privileges. Part of the source code fs/binfmt_elf.c is as follows: static int load_elf_library(struct file *file) { [904] down_write(¤t->mm->mmap_sem); error = do_mmap(file, ELF_PAGESTART(elf_phdata->p_vaddr), ( elf_phdata- > p_filesz + ELF_PAGEOFFSET(elf_phdata- > p_vaddr)), PROT_READ | PROT_WRITE | PROT_EXEC, MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE, (elf_phdata- > p_offset - ELF_PAGEOFFSET(elf_phdata- > p_vaddr))); >mmap_sem); if (error != ELF_PAGESTART(elf_phdata->p_vaddr)) goto out_free_ph;.
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
TITLE: Debian update for kernel-source-2.4.17
SECUNIA ADVISORY ID: SA20338
VERIFY ADVISORY: http://secunia.com/advisories/20338/
CRITICAL: Moderately critical
IMPACT: Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access
WHERE:
From remote
OPERATING SYSTEM: Debian GNU/Linux 3.0 http://secunia.com/product/143/
DESCRIPTION: Debian has issued an update for kernel-source-2.4.17. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of sensitive information, cause a DoS (Denial of Service), gain escalated privileges, and by malicious people to cause a DoS, and disclose potentially sensitive information.
For more information: SA10533 SA11464 SA11861 SA11943 SA13232 SA13469 SA13126 SA13308 SA13627 SA13756 SA13493 SA13822 SA14295 SA14570 SA13784
SOLUTION: Apply updated packages.
-- Debian GNU/Linux 3.0 alias woody --
Source archives:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc Size/MD5 checksum: 713 6ff55b14d3ae957c55bbed7fabf4c047 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz Size/MD5 checksum: 30437486 86601103169da686167972e5e560e3d4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc Size/MD5 checksum: 736 f97d95c6ecc26401f8f2fc2ead6cf421 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz Size/MD5 checksum: 25419305 9bc354f889edd4964840475400b088b7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc Size/MD5 checksum: 800 d20db4ab99e311150734b70519cc31e9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz Size/MD5 checksum: 12283 f51a7e01941baca7010fb8c2f0f67fe3 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc Size/MD5 checksum: 694 2d48f4cfa4917904b6c1f806ecc1bdb4 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz Size/MD5 checksum: 491935 94638c0c03b6b163f46319e777d4aa71 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc Size/MD5 checksum: 805 b48cbc9c2cd59eee3a52f54cfa5356e0 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz Size/MD5 checksum: 1150966 6748462e7bce7c917e066e0594d42571 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc Size/MD5 checksum: 664 f49e9cba55a8a4b098e5dc522f2a07fc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz Size/MD5 checksum: 344642 3a488cc38ffc619bfff4bfbb75eff4cd http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc Size/MD5 checksum: 609 4e0f66c1811cfb9e926c21566e55b202 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz Size/MD5 checksum: 29768549 bc1f8eab880a33bfe2ebeb3ef8b6557a
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb Size/MD5 checksum: 24455128 ed5362b12c6327295cd89027ff8e80ab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb Size/MD5 checksum: 24735538 cf9ddb702811464ac2dd2231512053f9 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb Size/MD5 checksum: 1151866 6f2575f26e7800e1e7a7cafdaf02b3a6 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb Size/MD5 checksum: 300202 0f5db53cdab20024b4a3a75bd0799b1a http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb Size/MD5 checksum: 1708122 7d18878351662289ac0841e0ad8f10f4 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb Size/MD5 checksum: 23972270 a0bf4a2796a9b49c36579166e6a72d62
HP Precision architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb Size/MD5 checksum: 3523044 63c790a70164e579c8bb3b8a08ea69b5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb Size/MD5 checksum: 2869994 e9e2be22d5fdf40f2e879570adc1132d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb Size/MD5 checksum: 3006192 cf53ac718c6ed26a59802e74c5926f00 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb Size/MD5 checksum: 3029436 d0e0fd747af9ff7a3633ee9cc6b1f1e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb Size/MD5 checksum: 3170356 ca408698a580463da3a547b2f87006e4 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb Size/MD5 checksum: 16886 437018078d9d01e25702cf1a20c23414
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb Size/MD5 checksum: 3638280 b6cd4e0d4129b6f4d0734253818cd828 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb Size/MD5 checksum: 7026800 55e4cd610c06297c7132ce2aeb88d029 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb Size/MD5 checksum: 7172892 a66f94c18d8ee4354e9446655837c72a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb Size/MD5 checksum: 7014470 d99cc0f293c747a295230de934328007 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb Size/MD5 checksum: 7165570 997a9dbf17821067de6ceb65548e7c2b http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb Size/MD5 checksum: 21616 1eab80187061fbd304b6328533d7dc33
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb Size/MD5 checksum: 3379418 74817217abf90896eb63d6c6792839fe http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb Size/MD5 checksum: 1346190 39433c757763336b6c14bf0d00652596 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb Size/MD5 checksum: 16404 9cfcf10a2a2ef99bbb009a650cddd227
PowerPC architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 3409712 698750e3998ee3792db43f445a8a8d96 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 2211146 103890e43508a5913a10ff8be80e9cdc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 4602 31ef3f45675fc13836337dee97486e20 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 490842 799441a4e49b88f780353d7aff9f29d2 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb Size/MD5 checksum: 16280 4e54c040bc83523d8122287bab6df7a5
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb Size/MD5 checksum: 3523520 45f001c255a3a66f22148d84d035abb1 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb Size/MD5 checksum: 2045436 c840c6ff8c9e3ab455d38021d09a391d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb Size/MD5 checksum: 2045226 709ccbc6754644fa448c93058f0df504 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb Size/MD5 checksum: 16556 019623b1dbc75bff84d7f056435dc6db
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 3522422 2118440d1658730fd93f47867848573c http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 2200968 63bc732deee6df19b83f10a50485a476 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 2195278 697eb9b05f765c332eca175284eb24b8 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 17836 61df1f292dccb4e64cb956a629f729fc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb Size/MD5 checksum: 16558 f8382b01aca2c535988b5ab5709dae90
Alpha architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb Size/MD5 checksum: 17180 7d1cf8fb24431c01f45fadf7becb6d2e
ARM architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb Size/MD5 checksum: 15878 fcf97ed103c205699fb5396c3a49e293
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb Size/MD5 checksum: 15518 2e7d50090a469a84ef7f3ae8aa97b85f
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb Size/MD5 checksum: 15368 41a11620bf7ea34b15742ccf59ff6895
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb Size/MD5 checksum: 18356 71b076d3eeff837bfb54a7f538b11b58
ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1082
OTHER REFERENCES: SA10533: http://secunia.com/advisories/10533/
SA11464: http://secunia.com/advisories/11464/
SA11861: http://secunia.com/advisories/11861/
SA11943: http://secunia.com/advisories/11943/
SA13232: http://secunia.com/advisories/13232/
SA13469: http://secunia.com/advisories/13469/
SA13126: http://secunia.com/advisories/13126/
SA13308: http://secunia.com/advisories/13308/
SA13627: http://secunia.com/advisories/13627/
SA13756: http://secunia.com/advisories/13756/
SA13493: http://secunia.com/advisories/13493/
SA13822: http://secunia.com/advisories/13822/
SA14295: http://secunia.com/advisories/14295/
SA14570: http://secunia.com/advisories/14570/
SA13784: http://secunia.com/advisories/13784/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0463", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mandrake linux", "scope": "eq", "trust": 1.6, "vendor": "mandrakesoft", "version": "10.0" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.6, "vendor": "mandrakesoft", "version": "9.2" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "suse", "version": "8.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.28" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.26" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.25" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.22" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.20" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.17" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.16" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.15" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.14" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.13" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.10" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.9" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.1" }, { "model": "converged communications server", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0" }, { "model": "fedora core", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "core_2.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "1.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "conectiva", "version": "10.0" }, { "model": "mandrake linux corporate server", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "fedora core", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "core_1.0" }, { "model": "network routing", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.0" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "8.2" }, { "model": "s8710", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.24_ow1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "mandrake multi network firewall", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "8.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.0" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "mandrake linux corporate server", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.2" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6_test9_cvs" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.1" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "mn100", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "2.0" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.23_ow2" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "fedora core", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "core_3.0" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "8" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "ubuntu", "version": "4.1" }, { "model": "s8710", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "linux ia64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "linux ia32", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "fedora core3", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "fedora core2", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "fedora core1", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -test9-cvs", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -ow1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel -pre9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel -ow2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel pre7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel -pre6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel pre-8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18x86" }, { "model": "kernel .0-test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test12", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "network routing", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mn100", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null } ], "sources": [ { "db": "BID", "id": "12190" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "db": "CNNVD", "id": "CNNVD-200504-062" }, { "db": "NVD", "id": "CVE-2004-1235" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000008" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Paul Starzetz paul@starzetz.de", "sources": [ { "db": "CNNVD", "id": "CNNVD-200504-062" } ], "trust": 0.6 }, "cve": "CVE-2004-1235", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.9, "id": "CVE-2004-1235", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.9, "id": "VHN-9665", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-1235", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2004-1235", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200504-062", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-9665", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2004-1235", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9665" }, { "db": "VULMON", "id": "CVE-2004-1235" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "db": "CNNVD", "id": "CNNVD-200504-062" }, { "db": "NVD", "id": "CVE-2004-1235" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Linux Kernel of (1) load_elf_library() function, (2) binfmt_aout() Functions include brk There is a flaw in the handling of the segment that causes a race condition.root You may get permission. Linux kernel is reported prone to a local privilege-escalation vulnerability. This issue arises in the \u0027uselib()\u0027 functions of the Linux binary-format loader as a result of a race condition. Successful exploitation of this vulnerability can allow a local attacker to gain elevated privileges on a vulnerable computer. \nThe ELF and a.out loaders are reportedly affected by this vulnerability. The Linux kernel provides a binary format loader layer to load programs in different formats such as ELF or a.out or others, and the kernel also provides the sys_uselib() function to load corresponding binary programs. From the analysis of the uselib function of load_elf_library() in the binfmt_elf.c file, there is a problem in the processing of the BRK segment (VMA) of the library. This segment is established through current-\u003emm-\u003emmap_sem. When modifying the memory layout of the calling process\\ \u0027\\\u0027 semaphore \\\u0027\\\u0027 (semaphore) is not maintained, this can be used to mess with memory management and elevate privileges. Part of the source code fs/binfmt_elf.c is as follows: static int load_elf_library(struct file *file) { [904] down_write(\u00a4t-\u003emm-\u003emmap_sem); error = do_mmap(file, ELF_PAGESTART(elf_phdata-\u003ep_vaddr), ( elf_phdata- \u003e p_filesz + ELF_PAGEOFFSET(elf_phdata- \u003e p_vaddr)), PROT_READ | PROT_WRITE | PROT_EXEC, MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE, (elf_phdata- \u003e p_offset - ELF_PAGEOFFSET(elf_phdata- \u003e p_vaddr))); \u003emmap_sem); if (error != ELF_PAGESTART(elf_phdata-\u003ep_vaddr)) goto out_free_ph;. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\nhttp://secunia.com/secunia_security_specialist/\n\n----------------------------------------------------------------------\n\nTITLE:\nDebian update for kernel-source-2.4.17\n\nSECUNIA ADVISORY ID:\nSA20338\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/20338/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nExposure of system information, Exposure of sensitive information,\nPrivilege escalation, DoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nDebian GNU/Linux 3.0\nhttp://secunia.com/product/143/\n\nDESCRIPTION:\nDebian has issued an update for kernel-source-2.4.17. This fixes some\nvulnerabilities, which can be exploited by malicious, local users to\ngain knowledge of sensitive information, cause a DoS (Denial of\nService), gain escalated privileges, and by malicious people to cause\na DoS, and disclose potentially sensitive information. \n\nFor more information:\nSA10533\nSA11464\nSA11861\nSA11943\nSA13232\nSA13469\nSA13126\nSA13308\nSA13627\nSA13756\nSA13493\nSA13822\nSA14295\nSA14570\nSA13784\n\nSOLUTION:\nApply updated packages. \n\n-- Debian GNU/Linux 3.0 alias woody --\n\nSource archives:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc\nSize/MD5 checksum: 713 6ff55b14d3ae957c55bbed7fabf4c047\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz\nSize/MD5 checksum: 30437486 86601103169da686167972e5e560e3d4\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc\nSize/MD5 checksum: 736 f97d95c6ecc26401f8f2fc2ead6cf421\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz\nSize/MD5 checksum: 25419305 9bc354f889edd4964840475400b088b7\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc\nSize/MD5 checksum: 800 d20db4ab99e311150734b70519cc31e9\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz\nSize/MD5 checksum: 12283 f51a7e01941baca7010fb8c2f0f67fe3\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc\nSize/MD5 checksum: 694 2d48f4cfa4917904b6c1f806ecc1bdb4\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz\nSize/MD5 checksum: 491935 94638c0c03b6b163f46319e777d4aa71\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc\nSize/MD5 checksum: 805 b48cbc9c2cd59eee3a52f54cfa5356e0\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz\nSize/MD5 checksum: 1150966 6748462e7bce7c917e066e0594d42571\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc\nSize/MD5 checksum: 664 f49e9cba55a8a4b098e5dc522f2a07fc\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz\nSize/MD5 checksum: 344642 3a488cc38ffc619bfff4bfbb75eff4cd\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc\nSize/MD5 checksum: 609 4e0f66c1811cfb9e926c21566e55b202\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz\nSize/MD5 checksum: 29768549 bc1f8eab880a33bfe2ebeb3ef8b6557a\n\nArchitecture independent components:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb\nSize/MD5 checksum: 24455128 ed5362b12c6327295cd89027ff8e80ab\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb\nSize/MD5 checksum: 24735538 cf9ddb702811464ac2dd2231512053f9\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb\nSize/MD5 checksum: 1151866 6f2575f26e7800e1e7a7cafdaf02b3a6\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb\nSize/MD5 checksum: 300202 0f5db53cdab20024b4a3a75bd0799b1a\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb\nSize/MD5 checksum: 1708122 7d18878351662289ac0841e0ad8f10f4\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb\nSize/MD5 checksum: 23972270 a0bf4a2796a9b49c36579166e6a72d62\n\nHP Precision architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb\nSize/MD5 checksum: 3523044 63c790a70164e579c8bb3b8a08ea69b5\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb\nSize/MD5 checksum: 2869994 e9e2be22d5fdf40f2e879570adc1132d\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb\nSize/MD5 checksum: 3006192 cf53ac718c6ed26a59802e74c5926f00\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb\nSize/MD5 checksum: 3029436 d0e0fd747af9ff7a3633ee9cc6b1f1e6\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb\nSize/MD5 checksum: 3170356 ca408698a580463da3a547b2f87006e4\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb\nSize/MD5 checksum: 16886 437018078d9d01e25702cf1a20c23414\n\nIntel IA-64 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb\nSize/MD5 checksum: 3638280 b6cd4e0d4129b6f4d0734253818cd828\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb\nSize/MD5 checksum: 7026800 55e4cd610c06297c7132ce2aeb88d029\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb\nSize/MD5 checksum: 7172892 a66f94c18d8ee4354e9446655837c72a\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb\nSize/MD5 checksum: 7014470 d99cc0f293c747a295230de934328007\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb\nSize/MD5 checksum: 7165570 997a9dbf17821067de6ceb65548e7c2b\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb\nSize/MD5 checksum: 21616 1eab80187061fbd304b6328533d7dc33\n\nIBM S/390 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb\nSize/MD5 checksum: 3379418 74817217abf90896eb63d6c6792839fe\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb\nSize/MD5 checksum: 1346190 39433c757763336b6c14bf0d00652596\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb\nSize/MD5 checksum: 16404 9cfcf10a2a2ef99bbb009a650cddd227\n\nPowerPC architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 3409712 698750e3998ee3792db43f445a8a8d96\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 2211146 103890e43508a5913a10ff8be80e9cdc\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 4602 31ef3f45675fc13836337dee97486e20\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 490842 799441a4e49b88f780353d7aff9f29d2\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb\nSize/MD5 checksum: 16280 4e54c040bc83523d8122287bab6df7a5\n\nBig endian MIPS architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb\nSize/MD5 checksum: 3523520 45f001c255a3a66f22148d84d035abb1\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb\nSize/MD5 checksum: 2045436 c840c6ff8c9e3ab455d38021d09a391d\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb\nSize/MD5 checksum: 2045226 709ccbc6754644fa448c93058f0df504\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb\nSize/MD5 checksum: 16556 019623b1dbc75bff84d7f056435dc6db\n\nLittle endian MIPS architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 3522422 2118440d1658730fd93f47867848573c\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 2200968 63bc732deee6df19b83f10a50485a476\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 2195278 697eb9b05f765c332eca175284eb24b8\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 17836 61df1f292dccb4e64cb956a629f729fc\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb\nSize/MD5 checksum: 16558 f8382b01aca2c535988b5ab5709dae90\n\nAlpha architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb\nSize/MD5 checksum: 17180 7d1cf8fb24431c01f45fadf7becb6d2e\n\nARM architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb\nSize/MD5 checksum: 15878 fcf97ed103c205699fb5396c3a49e293\n\nIntel IA-32 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb\nSize/MD5 checksum: 15518 2e7d50090a469a84ef7f3ae8aa97b85f\n\nMotorola 680x0 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb\nSize/MD5 checksum: 15368 41a11620bf7ea34b15742ccf59ff6895\n\nSun Sparc architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb\nSize/MD5 checksum: 18356 71b076d3eeff837bfb54a7f538b11b58\n\nORIGINAL ADVISORY:\nhttp://www.us.debian.org/security/2006/dsa-1082\n\nOTHER REFERENCES:\nSA10533:\nhttp://secunia.com/advisories/10533/\n\nSA11464:\nhttp://secunia.com/advisories/11464/\n\nSA11861:\nhttp://secunia.com/advisories/11861/\n\nSA11943:\nhttp://secunia.com/advisories/11943/\n\nSA13232:\nhttp://secunia.com/advisories/13232/\n\nSA13469:\nhttp://secunia.com/advisories/13469/\n\nSA13126:\nhttp://secunia.com/advisories/13126/\n\nSA13308:\nhttp://secunia.com/advisories/13308/\n\nSA13627:\nhttp://secunia.com/advisories/13627/\n\nSA13756:\nhttp://secunia.com/advisories/13756/\n\nSA13493:\nhttp://secunia.com/advisories/13493/\n\nSA13822:\nhttp://secunia.com/advisories/13822/\n\nSA14295:\nhttp://secunia.com/advisories/14295/\n\nSA14570:\nhttp://secunia.com/advisories/14570/\n\nSA13784:\nhttp://secunia.com/advisories/13784/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2004-1235" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "db": "BID", "id": "12190" }, { "db": "VULHUB", "id": "VHN-9665" }, { "db": "VULMON", "id": "CVE-2004-1235" }, { "db": "PACKETSTORM", "id": "46535" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=744", "trust": 0.3, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-9665", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9665" }, { "db": "VULMON", "id": "CVE-2004-1235" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "12190", "trust": 2.9 }, { "db": "NVD", "id": "CVE-2004-1235", "trust": 2.9 }, { "db": "SECUNIA", "id": "20202", "trust": 1.9 }, { "db": "SECUNIA", "id": "20338", "trust": 1.9 }, { "db": "SECUNIA", "id": "20162", "trust": 1.9 }, { "db": "SECUNIA", "id": "20163", "trust": 1.9 }, { "db": "SECUNIA", "id": "13756", "trust": 0.8 }, { "db": "SECTRACK", "id": "1012810", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000008", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200504-062", "trust": 0.7 }, { "db": "REDHAT", "id": "RHSA-2005:017", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:043", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:016", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:092", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1069", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1070", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1082", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1067", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SR:2005:001", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2005-014", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2005-013", "trust": 0.6 }, { "db": "FEDORA", "id": "FLSA:2336", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2005:022", "trust": 0.6 }, { "db": "XF", "id": "18800", "trust": 0.6 }, { "db": "TRUSTIX", "id": "2005-0001", "trust": 0.6 }, { "db": "CONECTIVA", "id": "CLA-2005:930", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20050107 LINUX KERNEL SYS_USELIB LOCAL ROOT VULNERABILITY", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "744", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-62968", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "35641", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "35920", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "778", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "895", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9665", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2004-1235", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46535", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46873", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46534", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46587", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9665" }, { "db": "VULMON", "id": "CVE-2004-1235" }, { "db": "BID", "id": "12190" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "db": "PACKETSTORM", "id": "46535" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "CNNVD", "id": "CNNVD-200504-062" }, { "db": "NVD", "id": "CVE-2004-1235" } ] }, "id": "VAR-200501-0463", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9665" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:11:50.161000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kernel_30", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/kernel_30.html" }, { "title": "RHSA-2005:017", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-017.html" }, { "title": "RHSA-2005:092", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-092.html" }, { "title": "RHSA-2005:043", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-043.html" }, { "title": "RHSA-2005:016", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-016.html" }, { "title": "TLSA-2005-29", "trust": 0.8, "url": "http://www.turbolinux.com/security/2005/TLSA-2005-29.txt" }, { "title": "RHSA-2005:043", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-043J.html" }, { "title": "RHSA-2005:016", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-016J.html" }, { "title": "RHSA-2005:017", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-017J.html" }, { "title": "RHSA-2005:092", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-092J.html" }, { "title": "TLSA-2005-29", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2005/TLSA-2005-29j.txt" }, { "title": "Ubuntu Security Notice: linux-source-2.6.8.1 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-57-1" }, { "title": "Red Hat: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-2005043 - Security Advisory" }, { "title": "Red Hat: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-2005016 - Security Advisory" }, { "title": "Red Hat: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-2005017 - Security Advisory" }, { "title": "Red Hat: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-2005092 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-1069-1 kernel-source-2.4.18 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=8f142ef483ef182da579a853641273b4" }, { "title": "Debian Security Advisories: DSA-1067-1 kernel-source-2.4.16 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=b7e58f3ba3a41c2f220a9b5beec79066" }, { "title": "Debian Security Advisories: DSA-1070-1 kernel-source-2.4.19 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=43028482bc5e84e25f6599c9be08b557" }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/Shadowshusky/linux-kernel-exploits " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/Feng4/linux-kernel-exploits " }, { "title": "Linux-kernel-EoP-exp", "trust": 0.1, "url": "https://github.com/De4dCr0w/Linux-kernel-EoP-exp " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/zyjsuper/linux-kernel-exploits " }, { "title": "linux-exp", "trust": 0.1, "url": "https://github.com/QChiLan/linux-exp " }, { "title": "LinuxEelvation", "trust": 0.1, "url": "https://github.com/Al1ex/LinuxEelvation " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/Straight-wood/linux-kernel-exploits " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/yige666/linux-kernel-exploits " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/kumardineshwar/linux-kernel-exploits " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/vahalen/linux-kernel-exploits " }, { "title": "linux-exp", "trust": 0.1, "url": "https://github.com/coffee727/linux-exp " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/m0mkris/linux-kernel-exploits " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/xssfile/linux-kernel-exploits " }, { "title": "LinuxElevation", "trust": 0.1, "url": "https://github.com/Al1ex/LinuxElvation " }, { "title": "LinuxEelvation", "trust": 0.1, "url": "https://github.com/fei9747/LinuxEelvation " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/C0dak/linux-kernel-exploits " }, { "title": "local-root-exploit-", "trust": 0.1, "url": "https://github.com/sohaip-hackerDZ/local-root-exploit- " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/xfinest/linux-kernel-exploits " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/SecWiki/linux-kernel-exploits " }, { "title": "Localroot-ALL-CVE", "trust": 0.1, "url": "https://github.com/Snoopy-Sec/Localroot-ALL-CVE " }, { "title": "linux-kernel-exploits", "trust": 0.1, "url": "https://github.com/Micr067/linux-kernel-exploits " }, { "title": "LinuxElevation", "trust": 0.1, "url": "https://github.com/Al1ex/LinuxElevation " } ], "sources": [ { "db": "VULMON", "id": "CVE-2004-1235" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1235" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/12190" }, { "trust": 1.8, "url": "http://www.securityfocus.com/advisories/7804" }, { "trust": 1.8, "url": "http://www.debian.org/security/2006/dsa-1067" }, { "trust": 1.8, "url": "http://www.debian.org/security/2006/dsa-1069" }, { "trust": 1.8, "url": "http://www.debian.org/security/2006/dsa-1070" }, { "trust": 1.8, "url": "http://www.debian.org/security/2006/dsa-1082" }, { "trust": 1.8, "url": "http://www.securityfocus.com/advisories/7806" }, { "trust": 1.8, "url": "http://www.securityfocus.com/advisories/7805" }, { "trust": 1.8, "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "trust": 1.8, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2005:022" }, { "trust": 1.8, "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2005-016.html" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2005-017.html" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2005-043.html" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2005-092.html" }, { "trust": 1.8, "url": "http://secunia.com/advisories/20162" }, { "trust": 1.8, "url": "http://secunia.com/advisories/20163" }, { "trust": 1.8, "url": "http://secunia.com/advisories/20202" }, { "trust": 1.8, "url": "http://secunia.com/advisories/20338" }, { "trust": 1.8, "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "trust": 1.8, "url": "http://www.trustix.org/errata/2005/0001/" }, { "trust": 1.7, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9567" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "trust": 1.2, "url": "http://secunia.com/advisories/13756/" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-1235" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-1235" }, { "trust": 0.8, "url": "http://www.securiteam.com/unixfocus/5gp022kekq.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/jan/1012810.html" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/18800" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13232/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13469/" }, { "trust": 0.4, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13308/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13822/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/11464/" }, { "trust": 0.4, "url": "http://secunia.com/product/143/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/10533/" }, { "trust": 0.4, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13126/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/11943/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13627/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/14570/" }, { "trust": 0.4, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/11861/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13784/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/14295/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/13493/" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-034_rhsa-2005-016rhsa-2006-017rhsa-2005-043.pdf" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-043.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2005-092.html" }, { "trust": 0.3, "url": "/archive/1/386399" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=110512575901427\u0026amp;w=2" }, { "trust": 0.1, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026amp;anuncio=000930" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=8612" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/57-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/744/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20162/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1067" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20338/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1082" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1070" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20163/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1069" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20202/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9665" }, { "db": "VULMON", "id": "CVE-2004-1235" }, { "db": "BID", "id": "12190" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "db": "PACKETSTORM", "id": "46535" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "CNNVD", "id": "CNNVD-200504-062" }, { "db": "NVD", "id": "CVE-2004-1235" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9665" }, { "db": "VULMON", "id": "CVE-2004-1235" }, { "db": "BID", "id": "12190" }, { "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "db": "PACKETSTORM", "id": "46535" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "CNNVD", "id": "CNNVD-200504-062" }, { "db": "NVD", "id": "CVE-2004-1235" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-04-14T00:00:00", "db": "VULHUB", "id": "VHN-9665" }, { "date": "2005-04-14T00:00:00", "db": "VULMON", "id": "CVE-2004-1235" }, { "date": "2005-01-07T00:00:00", "db": "BID", "id": "12190" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "date": "2006-05-23T05:09:34", "db": "PACKETSTORM", "id": "46535" }, { "date": "2006-05-31T21:33:01", "db": "PACKETSTORM", "id": "46873" }, { "date": "2006-05-23T05:09:34", "db": "PACKETSTORM", "id": "46534" }, { "date": "2006-05-23T16:45:46", "db": "PACKETSTORM", "id": "46587" }, { "date": "2005-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200504-062" }, { "date": "2005-04-14T04:00:00", "db": "NVD", "id": "CVE-2004-1235" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-9665" }, { "date": "2017-10-11T00:00:00", "db": "VULMON", "id": "CVE-2004-1235" }, { "date": "2007-01-18T02:41:00", "db": "BID", "id": "12190" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000008" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200504-062" }, { "date": "2017-10-11T01:29:43.527000", "db": "NVD", "id": "CVE-2004-1235" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "12190" }, { "db": "PACKETSTORM", "id": "46535" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "CNNVD", "id": "CNNVD-200504-062" } ], "trust": 1.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel of Multiple function race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000008" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competitive condition", "sources": [ { "db": "CNNVD", "id": "CNNVD-200504-062" } ], "trust": 0.6 } }
gsd-2004-1235
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-1235", "description": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "id": "GSD-2004-1235", "references": [ "https://www.suse.com/security/cve/CVE-2004-1235.html", "https://www.debian.org/security/2006/dsa-1082", "https://www.debian.org/security/2006/dsa-1070", "https://www.debian.org/security/2006/dsa-1067", "https://www.debian.org/security/2006/dsa-1069", "https://access.redhat.com/errata/RHSA-2005:092", "https://access.redhat.com/errata/RHSA-2005:043", "https://access.redhat.com/errata/RHSA-2005:017", "https://access.redhat.com/errata/RHSA-2005:016", "https://packetstormsecurity.com/files/cve/CVE-2004-1235" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-1235" ], "details": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "id": "GSD-2004-1235", "modified": "2023-12-13T01:22:56.314962Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "http://www.securityfocus.com/advisories/7804", "refsource": "CONFIRM", "url": "http://www.securityfocus.com/advisories/7804" }, { "name": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", "refsource": "MISC", "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "RHSA-2005:016", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "RHSA-2005:092", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "FEDORA-2005-014", "refsource": "FEDORA", "url": "http://www.securityfocus.com/advisories/7805" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "CLA-2005:930", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "SUSE-SR:2005:001", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "12190", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12190" }, { "name": "linux-uselib-gain-privileges(18800)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "name": "20050107 Linux kernel sys_uselib local root vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9567", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567" }, { "name": "FEDORA-2005-013", "refsource": "FEDORA", "url": "http://www.securityfocus.com/advisories/7806" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1235" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2005:043", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "12190", "refsource": "BID", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/12190" }, { "name": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", "refsource": "MISC", "tags": [], "url": "http://isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "name": "CLA-2005:930", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930" }, { "name": "FEDORA-2005-013", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/advisories/7806" }, { "name": "FEDORA-2005-014", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/advisories/7805" }, { "name": "FLSA:2336", "refsource": "FEDORA", "tags": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "RHSA-2005:092", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-092.html" }, { "name": "2005-0001", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "http://www.securityfocus.com/advisories/7804", "refsource": "CONFIRM", "tags": [], "url": "http://www.securityfocus.com/advisories/7804" }, { "name": "RHSA-2005:016", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "20162", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20162" }, { "name": "20163", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20163" }, { "name": "20202", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20338" }, { "name": "SUSE-SR:2005:001", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "DSA-1067", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1070", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "DSA-1082", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "DSA-1069", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "20050107 Linux kernel sys_uselib local root vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=110512575901427\u0026w=2" }, { "name": "linux-uselib-gain-privileges(18800)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800" }, { "name": "oval:org.mitre.oval:def:9567", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2005-04-14T04:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.