Action not permitted
Modal body text goes here.
cve-2005-4798
Vulnerability from cvelistv5
Published
2006-05-09 20:00
Modified
2024-08-08 00:01
Severity ?
EPSS score ?
Summary
Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:22.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-1183", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1183" }, { "name": "oval:org.mitre.oval:def:11536", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536" }, { "name": "22082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22082" }, { "name": "SUSE-SA:2006:028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" }, { "name": "20186", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20186" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "[linux-kernel] 20050912 [PATCH] nfs client, kernel 2.4.31: readlink result overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html" }, { "name": "20398", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20398" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commitdiff%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "22093", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22093" }, { "name": "DSA-1184", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1184" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-1183", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1183" }, { "name": "oval:org.mitre.oval:def:11536", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536" }, { "name": "22082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22082" }, { "name": "SUSE-SA:2006:028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" }, { "name": "20186", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20186" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "[linux-kernel] 20050912 [PATCH] nfs client, kernel 2.4.31: readlink result overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html" }, { "name": "20398", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20398" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commitdiff%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "22093", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22093" }, { "name": "DSA-1184", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1184" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4798", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-1183", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1183" }, { "name": "oval:org.mitre.oval:def:11536", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536" }, { "name": "22082", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22082" }, { "name": "SUSE-SA:2006:028", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" }, { "name": "20186", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20186" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "[linux-kernel] 20050912 [PATCH] nfs client, kernel 2.4.31: readlink result overflow", "refsource": "MLIST", "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html" }, { "name": "20398", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20398" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "22093", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22093" }, { "name": "DSA-1184", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1184" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4798", "datePublished": "2006-05-09T20:00:00", "dateReserved": "2006-05-09T00:00:00", "dateUpdated": "2024-08-08T00:01:22.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-4798\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-12-31T05:00:00.000\",\"lastModified\":\"2024-11-21T00:05:12.483\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E244C37-E366-482E-9173-9376D0839839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F96BB9-6509-4F1E-9590-E55EE8C6F992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*\",\"matchCriteriaId\":\"12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"718D4631-440E-4783-8966-B2A2D3EF89B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6111EDDB-065F-4AD1-925C-E0A3C1DE26AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A2F7E7-0C51-43F2-BCEA-01FF738971D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015F57A-1E3B-42D2-9D12-F695078EFB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"467721EE-5130-46C5-BBB7-0F4878F3F171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"171257E7-12C5-4283-88F7-FFE643995563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"0887E02F-9F36-41F0-9F75-060B8414D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01278984-9712-48D0-B8B8-F9ACEB0FBA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D77F8919-4064-4EA5-A948-76178EA21F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7C423D-23DE-4C7B-A518-66F87E041925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA1382E-71B0-4E65-A310-716A244F4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"824BBD31-8F3B-4F05-981B-ABF662BBF5F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"388A5C99-1F60-4C20-9AE5-6E73E5A3F819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B252BE-92F1-42E2-BF2F-EA6B6AFFEE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888F8D7-15C2-4435-BB3C-8674DFAF0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29439AD0-EB8D-4675-A77A-6548FF27ADA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27AADF6-1605-47FC-8C4D-87827A578A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42F4080-A76F-4D17-85E2-CD2D2E4D0450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6968EF1D-7CC5-430D-866D-206F66486F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E6F5C5-BF74-4C10-830A-F232D528D290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD8E4AE-FEF7-4CE2-B338-4F766921593F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8B50A-73F6-4FCF-A81F-FB624FBA7143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1D21AD5-C34F-4005-92F3-98F714DE98D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D27D843-2DA7-4481-857C-09FDC4FBD45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB93128-2743-4668-8C48-9B7282D4A672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA592BC-5846-4FC1-B2A7-13E622705DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FE15BF-91C7-452A-BE1B-7EC9632421C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C1923C-D9C4-400D-9F0F-20B519EEC9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51913F9-FC7D-450A-9A82-5084AA74A5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62E02D5-9EEE-439B-A510-BEEE28A9F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02278C07-E649-427D-9E5C-F1738A01BCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361D407D-A4BE-491D-BC8E-32E78DC4A8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F83D55B-3106-4907-A75F-A7EBF0EC6974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AFD594E-48BA-4281-8DEE-306E3008ABB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CD7983-4EB2-4D17-9332-493ECBADC284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB7E049-4B49-4FB5-815B-39CEAEDE6ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"637A08D0-E382-4DE8-AEEC-6A53A72849B9\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/20398\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22082\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22093\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1183\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1184\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commitdiff%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006-05-31.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/20186\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20398\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commitdiff%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006-05-31.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/20186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-r7wx-4mj5-7j6j
Vulnerability from github
Published
2022-05-01 02:30
Modified
2022-05-01 02:30
Details
Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.
{ "affected": [], "aliases": [ "CVE-2005-4798" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-12-31T05:00:00Z", "severity": "MODERATE" }, "details": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "id": "GHSA-r7wx-4mj5-7j6j", "modified": "2022-05-01T02:30:43Z", "published": "2022-05-01T02:30:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536" }, { "type": "WEB", "url": "http://secunia.com/advisories/20398" }, { "type": "WEB", "url": "http://secunia.com/advisories/22082" }, { "type": "WEB", "url": "http://secunia.com/advisories/22093" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1183" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1184" }, { "type": "WEB", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "type": "WEB", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/20186" }, { "type": "WEB", "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2005-4798
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-4798", "description": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "id": "GSD-2005-4798", "references": [ "https://www.suse.com/security/cve/CVE-2005-4798.html", "https://www.debian.org/security/2006/dsa-1183", "https://www.debian.org/security/2006/dsa-1184", "https://access.redhat.com/errata/RHSA-2006:0144" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-4798" ], "details": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "id": "GSD-2005-4798", "modified": "2023-12-13T01:20:09.678554Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4798", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-1183", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1183" }, { "name": "oval:org.mitre.oval:def:11536", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536" }, { "name": "22082", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22082" }, { "name": "SUSE-SA:2006:028", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" }, { "name": "20186", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20186" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "[linux-kernel] 20050912 [PATCH] nfs client, kernel 2.4.31: readlink result overflow", "refsource": "MLIST", "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html" }, { "name": "20398", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20398" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "22093", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22093" }, { "name": "DSA-1184", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1184" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4798" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-kernel] 20050912 [PATCH] nfs client, kernel 2.4.31: readlink result overflow", "refsource": "MLIST", "tags": [], "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b", "refsource": "CONFIRM", "tags": [], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b", "refsource": "CONFIRM", "tags": [], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b" }, { "name": "SUSE-SA:2006:028", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html" }, { "name": "20398", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20398" }, { "name": "DSA-1183", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1183" }, { "name": "DSA-1184", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1184" }, { "name": "22082", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22082" }, { "name": "22093", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22093" }, { "name": "20186", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/20186" }, { "name": "oval:org.mitre.oval:def:11536", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:30Z", "publishedDate": "2005-12-31T05:00Z" } } }
rhsa-2006_0144
Vulnerability from csaf_redhat
Published
2006-03-15 14:05
Modified
2024-11-22 00:09
Summary
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7
Notes
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3. This is the seventh
regular update.
This security advisory has been rated as having moderate security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This is the seventh regular kernel update to Red Hat Enterprise Linux 3.
New features introduced by this update include:
- addition of the bnx2, dell_rbu, and megaraid_sas device drivers
- support for multi-core, multi-threaded Intel Itanium processors
- upgrade of the SATA subsystem to include ATAPI and SMART support
- optional tuning via the new numa_memory_allocator, arp_announce,
and printk_ratelimit sysctls
There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement in
the reliability and scalability of Red Hat Enterprise Linux 3.
There were numerous driver updates and security fixes (elaborated below).
Other key areas affected by fixes in this update include the networking
subsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,
CPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.
The following device drivers have been upgraded to new versions:
aacraid -------- 1.1.5-2412
bnx2 ----------- 1.4.30 (new)
dell_rbu ------- 2.1 (new)
e1000 ---------- 6.1.16-k3
emulex --------- 7.3.3
fusion --------- 2.06.16.02
ipmi ----------- 35.11
megaraid2 ------ v2.10.10.1
megaraid_sas --- 00.00.02.00 (new)
tg3 ------------ 3.43RH
The following security bugs were fixed in this update:
- a flaw in gzip/zlib handling internal to the kernel that allowed
a local user to cause a denial of service (crash)
(CVE-2005-2458,low)
- a flaw in ext3 EA/ACL handling of attribute sharing that allowed
a local user to gain privileges (CVE-2005-2801, moderate)
- a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data
(CVE-2005-3276, low)
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support and\nmaintenance of Red Hat Enterprise Linux version 3. This is the seventh\nregular update.\n\nThis security advisory has been rated as having moderate security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include:\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device drivers\n - support for multi-core, multi-threaded Intel Itanium processors\n - upgrade of the SATA subsystem to include ATAPI and SMART support\n - optional tuning via the new numa_memory_allocator, arp_announce,\n and printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement in\nthe reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated below).\nOther key areas affected by fixes in this update include the networking\nsubsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,\nCPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.\n\nThe following device drivers have been upgraded to new versions:\n\n aacraid -------- 1.1.5-2412\n bnx2 ----------- 1.4.30 (new)\n dell_rbu ------- 2.1 (new)\n e1000 ---------- 6.1.16-k3\n emulex --------- 7.3.3\n fusion --------- 2.06.16.02\n ipmi ----------- 35.11\n megaraid2 ------ v2.10.10.1\n megaraid_sas --- 00.00.02.00 (new)\n tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update:\n\n - a flaw in gzip/zlib handling internal to the kernel that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that allowed\n a local user to gain privileges (CVE-2005-2801, moderate)\n\n - a minor info leak with the get_thread_area() syscall that allowed\n a local user to view uninitialized kernel stack data\n (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0144", "url": "https://access.redhat.com/errata/RHSA-2006:0144" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "112004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112004" }, { "category": "external", "summary": "112066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112066" }, { "category": "external", "summary": "117067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=117067" }, { "category": "external", "summary": "122256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=122256" }, { "category": "external", "summary": "125642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=125642" }, { "category": "external", "summary": "128015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=128015" }, { "category": "external", "summary": "129265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129265" }, { "category": "external", "summary": "130387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130387" }, { "category": "external", "summary": "130489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130489" }, { "category": "external", "summary": "130712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130712" }, { "category": "external", "summary": "131295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131295" }, { "category": "external", "summary": "132547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132547" }, { "category": "external", "summary": "134506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134506" }, { "category": "external", "summary": "136583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=136583" }, { "category": "external", "summary": "137101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137101" }, { "category": "external", "summary": "137344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137344" }, { "category": "external", "summary": "137998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137998" }, { "category": "external", "summary": "138730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138730" }, { "category": "external", "summary": "142579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142579" }, { "category": "external", "summary": "144033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144033" }, { "category": "external", "summary": "145596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145596" }, { "category": "external", "summary": "146663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146663" }, { "category": "external", "summary": "147870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147870" }, { "category": "external", "summary": "150559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150559" }, { "category": "external", "summary": "152103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152103" }, { "category": "external", "summary": "152650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152650" }, { "category": "external", "summary": "154028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154028" }, { "category": "external", "summary": "154385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154385" }, { "category": "external", "summary": "156396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156396" }, { "category": "external", "summary": "156397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156397" }, { "category": "external", "summary": "156645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156645" }, { "category": "external", "summary": "156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156987" }, { "category": "external", "summary": "156988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156988" }, { "category": "external", "summary": "156999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156999" }, { "category": "external", "summary": "157006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157006" }, { "category": "external", "summary": "158819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158819" }, { "category": "external", "summary": "158821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158821" }, { "category": "external", "summary": "159326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159326" }, { "category": "external", "summary": "159523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159523" }, { "category": "external", "summary": "159874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159874" }, { "category": "external", "summary": "159977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159977" }, { "category": "external", "summary": "160009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160009" }, { "category": "external", "summary": "160337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160337" }, { "category": "external", "summary": "160539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160539" }, { "category": "external", "summary": "161056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161056" }, { "category": "external", "summary": "161160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161160" }, { "category": "external", "summary": "161188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161188" }, { "category": "external", "summary": "161336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161336" }, { "category": "external", "summary": "161866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161866" }, { "category": "external", "summary": "161875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161875" }, { "category": "external", "summary": "162065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162065" }, { "category": "external", "summary": "162212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162212" }, { "category": "external", "summary": "162271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162271" }, { "category": "external", "summary": "162417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162417" }, { "category": "external", "summary": "162683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162683" }, { "category": "external", "summary": "162735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162735" }, { "category": "external", "summary": "163176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163176" }, { "category": "external", "summary": "163184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163184" }, { "category": "external", "summary": "163239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163239" }, { "category": "external", "summary": "163307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163307" }, { "category": "external", "summary": "163381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163381" }, { "category": "external", "summary": "163901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163901" }, { "category": "external", "summary": "163929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163929" }, { "category": "external", "summary": "164206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164206" }, { "category": "external", "summary": "164304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164304" }, { "category": "external", "summary": "164438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164438" }, { "category": "external", "summary": "164580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164580" }, { "category": "external", "summary": "164795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164795" }, { "category": "external", "summary": "164828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164828" }, { "category": "external", "summary": "165006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165006" }, { "category": "external", "summary": "165119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165119" }, { "category": "external", "summary": "165364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165364" }, { "category": "external", "summary": "165412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165412" }, { "category": "external", "summary": "165453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165453" }, { "category": "external", "summary": "165475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165475" }, { "category": "external", "summary": "165680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165680" }, { "category": "external", "summary": "165825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165825" }, { "category": "external", "summary": "165989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165989" }, { "category": "external", "summary": "166345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166345" }, { "category": "external", "summary": "166363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166363" }, { "category": "external", "summary": "166364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166364" }, { "category": "external", "summary": "166578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166578" }, { "category": "external", "summary": "166583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166583" }, { "category": "external", "summary": "166600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166600" }, { "category": "external", "summary": "166669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166669" }, { "category": "external", "summary": "167674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167674" }, { "category": "external", "summary": "167800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167800" }, { "category": "external", "summary": "167942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167942" }, { "category": "external", "summary": "168226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168226" }, { "category": "external", "summary": "168293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168293" }, { "category": "external", "summary": "168315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168315" }, { "category": "external", "summary": "168358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168358" }, { "category": "external", "summary": "168359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168359" }, { "category": "external", "summary": "168390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168390" }, { "category": "external", "summary": "168392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168392" }, { "category": "external", "summary": "168474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168474" }, { "category": "external", "summary": "168541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168541" }, { "category": "external", "summary": "168581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168581" }, { "category": "external", "summary": "168597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168597" }, { "category": "external", "summary": "168603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168603" }, { "category": "external", "summary": "168681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168681" }, { "category": "external", "summary": "168780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168780" }, { "category": "external", "summary": "168795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168795" }, { "category": "external", "summary": "168896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168896" }, { "category": "external", "summary": "169230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169230" }, { "category": "external", "summary": "169294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169294" }, { "category": "external", "summary": "169393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169393" }, { "category": "external", "summary": "169511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169511" }, { "category": "external", "summary": "169662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169662" }, { "category": "external", "summary": "169992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169992" }, { "category": "external", "summary": "170429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170429" }, { "category": "external", "summary": "170440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170440" }, { "category": "external", "summary": "170446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170446" }, { "category": "external", "summary": "170529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170529" }, { "category": "external", "summary": "170561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170561" }, { "category": "external", "summary": "170633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170633" }, { "category": "external", "summary": "171129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171129" }, { "category": "external", "summary": "171377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171377" }, { "category": "external", "summary": "172233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172233" }, { "category": "external", "summary": "172334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172334" }, { "category": "external", "summary": "172664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172664" }, { "category": "external", "summary": "173280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=173280" }, { "category": "external", "summary": "174005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174005" }, { "category": "external", "summary": "175017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175017" }, { "category": "external", "summary": "175154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175154" }, { "category": "external", "summary": "175211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175211" }, { "category": "external", "summary": "175365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175365" }, { "category": "external", "summary": "175624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175624" }, { "category": "external", "summary": "175625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175625" }, { "category": "external", "summary": "175767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175767" }, { "category": "external", "summary": "176264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176264" }, { "category": "external", "summary": "177023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177023" }, { "category": "external", "summary": "177573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177573" }, { "category": "external", "summary": "177691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177691" }, { "category": "external", "summary": "179168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=179168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0144.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7", "tracking": { "current_release_date": "2024-11-22T00:09:41+00:00", "generator": { "date": "2024-11-22T00:09:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0144", "initial_release_date": "2006-03-15T14:05:00+00:00", "revision_history": [ { "date": "2006-03-15T14:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-03-15T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:09:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-40.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.i386", "product": { "name": "kernel-source-0:2.4.21-40.EL.i386", "product_id": "kernel-source-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-40.EL.i386", "product_id": "kernel-doc-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-40.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.i686", "product": { "name": "kernel-0:2.4.21-40.EL.i686", "product_id": "kernel-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-40.EL.i686", "product_id": "kernel-smp-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-0:2.4.21-40.EL.athlon", "product_id": "kernel-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-40.EL.athlon", "product_id": "kernel-smp-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-0:2.4.21-40.EL.ia64", "product_id": "kernel-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-40.EL.ia64", "product_id": "kernel-source-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.ia64", "product_id": "kernel-doc-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-0:2.4.21-40.EL.ia32e", "product_id": "kernel-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-0:2.4.21-40.EL.x86_64", "product_id": "kernel-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-40.EL.x86_64", "product_id": "kernel-source-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.src", "product": { "name": "kernel-0:2.4.21-40.EL.src", "product_id": "kernel-0:2.4.21-40.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-0:2.4.21-40.EL.s390x", "product_id": "kernel-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-40.EL.s390x", "product_id": "kernel-source-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-40.EL.s390x", "product_id": "kernel-doc-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.s390", "product": { "name": "kernel-0:2.4.21-40.EL.s390", "product_id": "kernel-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.s390", "product": { "name": "kernel-source-0:2.4.21-40.EL.s390", "product_id": "kernel-source-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-40.EL.s390", "product_id": "kernel-doc-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-40.EL.ppc64", "product_id": "kernel-source-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2801", "discovery_date": "2005-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617759" } ], "notes": [ { "category": "description", "text": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2801" }, { "category": "external", "summary": "RHBZ#1617759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617759" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801" } ], "release_date": "2005-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3276", "discovery_date": "2005-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617813" } ], "notes": [ { "category": "description", "text": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3276" }, { "category": "external", "summary": "RHBZ#1617813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3276", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276" } ], "release_date": "2005-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-4798", "discovery_date": "2005-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617863" } ], "notes": [ { "category": "description", "text": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4798" }, { "category": "external", "summary": "RHBZ#1617863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4798", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798" } ], "release_date": "2005-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.