Action not permitted
Modal body text goes here.
cve-2007-5906
Vulnerability from cvelistv5
Published
2007-11-09 19:00
Modified
2024-08-07 15:47
Severity ?
EPSS score ?
Summary
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28412", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28412" }, { "name": "SUSE-SR:2008:002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" }, { "name": "[Xen-devel] 20071031 [PATCH, fixed] x86: fix debug register handling", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html" }, { "name": "28405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28405" }, { "name": "27219", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27219" }, { "name": "28636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28636" }, { "name": "SUSE-SR:2008:001", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-01-16T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28412", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28412" }, { "name": "SUSE-SR:2008:002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" }, { "name": "[Xen-devel] 20071031 [PATCH, fixed] x86: fix debug register handling", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html" }, { "name": "28405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28405" }, { "name": "27219", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27219" }, { "name": "28636", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28636" }, { "name": "SUSE-SR:2008:001", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28412", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28412" }, { "name": "SUSE-SR:2008:002", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" }, { "name": "[Xen-devel] 20071031 [PATCH, fixed] x86: fix debug register handling", "refsource": "MLIST", "url": "http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html" }, { "name": "28405", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28405" }, { "name": "27219", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27219" }, { "name": "28636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28636" }, { "name": "SUSE-SR:2008:001", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5906", "datePublished": "2007-11-09T19:00:00", "dateReserved": "2007-11-09T00:00:00", "dateUpdated": "2024-08-07T15:47:00.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-5906\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-11-09T19:46:00.000\",\"lastModified\":\"2024-11-21T00:38:55.017\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.\"},{\"lang\":\"es\",\"value\":\"El Xen 3.1.1 permite a usuarios invitados virtuales provocar una denegaci\u00f3n de servicio (ca\u00edda del hypervisor) mediante el uso de un registro de depuraci\u00f3n (DR7) para establecer ciertos puntos de ruptura.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xensource_inc:xen:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36206475-6E52-423C-B0CC-A24AC0311EE9\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/28405\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28412\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28636\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/suse_security_summary_report.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/27219\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/28405\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28412\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/suse_security_summary_report.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-f59f-86pc-5j7q
Vulnerability from github
Published
2022-05-01 18:37
Modified
2022-05-01 18:37
Details
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
{ "affected": [], "aliases": [ "CVE-2007-5906" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-11-09T19:46:00Z", "severity": "MODERATE" }, "details": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.", "id": "GHSA-f59f-86pc-5j7q", "modified": "2022-05-01T18:37:37Z", "published": "2022-05-01T18:37:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5906" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" }, { "type": "WEB", "url": "http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/28405" }, { "type": "WEB", "url": "http://secunia.com/advisories/28412" }, { "type": "WEB", "url": "http://secunia.com/advisories/28636" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27219" } ], "schema_version": "1.4.0", "severity": [] }
rhba-2008_0314
Vulnerability from csaf_redhat
Published
2008-05-21 00:00
Modified
2024-11-22 02:03
Summary
Red Hat Bug Fix Advisory: Updated kernel packages for Red Hat Enterprise Linux 5.2
Notes
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 5. This is the second
regular update.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
General Kernel Feature Support:
* rebase xen packages to version 3.1.2
* performance improvements and bug fixes for GFS2
* update utrace support
* add eCryptfs support
* add NFS server support for 32-bit clients, and 64-bit inodes
* add memory accounting in UDP
* add RFC 4303 compliant auditing support
* add new algorithms and interfaces in IPsec
* add authenc in crypto library
General Platform Support:
* update on-demand governor driver
* enable config options for IPMI panic handling
* add HDMI support for AMD and ATI integrated chipsets
* update OFED support to v1.3
* update FireWire support to latest upstream
* eliminate erroneous PCI Rom warning messages
* add support to offline CPU when realtime processes are running
Architecture Specific Support:
x86, AMD64, Intel(R) 64:
* add support of pci=norom boot parameter to disable p2p rom window
* enable pci=bfsort
* increase boot command line size to 2048 for 64-bit architectures
* add event based profiling support to AMD Greyhound systems
* add Intel Dynamic Acceleration Technology
Intel(R) 64:
* add CMCI for hot-plugged processors
* remove Intel(R) 64 stack hard limit of DEFAULT_USER_STACK_SIZE
* add zonelist order sysctl/boot option on NUMA systems
64-bit PowerPC:
* add OProfile support to IBM Cell/B.E. platforms
* update PMI driver for Cell blades
* enable support of FB_RADEON driver for IBM Power6 blades
* update ehea driver to latest upstream
* add Scaled Processor Utilization of Resources Register SPURR support
* boot Cell blades with more than 2GB memory
* improve watchpoint support in GDB for power platform
* improve hugepage allocation with memory-less nodes
* add SLB shadow buffer support
IBM System z:
* add large page support to IBM System z
* add IBM eServer zSeries HiperSockets MAC layer routing and IP packet
support
* add IBM z/VM monitor stream state 2 application support
* add support for IBM z/VM DIAG 2FC for HYPFS
* add AF_IUCV Protocol support on BSD socket interface
* add dynamic CHPID reconfiguration support via SCLP
New Driver Support or Driver Updates:
Miscellaneous Driver Updates:
* add R500/R600 drm driver (X11 deccelerator driver) support
* add trust computing/trust platfrom module
* add support for Realtek ALC888S codec
Network Driver Updates:
* add bnx2x driver for Broadcom 10GbE hardware
* add dm9601 driver support for DAVICOM's ZT6688
* update bnx2, e1000, e1000e, tg3, forcedeth, igb, ixgb, and cxgb3 drivers
* add WEXT scan capabilities to wireless extensions API
* update mac80211/iwl4965 infrastructure
* update cfg80211 driver to support mac80211/iwl4965
* update ixgbe driver to support new Intel 10GbE hardware
* add r8169 driver support for Realtek 8111c and 8101e loms
* update bonding, netxen, and ioatdma driver
Storage Driver Updates:
* update aic94xx, areca, aacraid, cciss, ibmvSCSI driver
* update ipr driver to add dual SAS RAID controller support
* add iSCSI Boot Firmware Table tool support
* update qla2xxx, mpt-fusion, lpfc, stex, megaraid_sas
* update firmwire for Qlogic 25xxx
* update SATA driver and infrastructure
* add SB800/SB700/SB600 SATA/LAN support
* add DRAC4 hotplug support
* add hotplug docking support for some laptops
* add uevent, and kobject to device mapper infrastructure for xDR/GDPs
* update device mapper support
For a comprehensive list of kernel-related updates, refer to the latest
version of the Red Hat Enterprise Linux 5.2 release notes on:
http://www.redhat.com/docs/manuals/enterprise/
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which apply these kernel updates.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support and\nmaintenance of Red Hat Enterprise Linux version 5. This is the second\nregular update.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nGeneral Kernel Feature Support:\n\n* rebase xen packages to version 3.1.2\n* performance improvements and bug fixes for GFS2\n* update utrace support\n* add eCryptfs support\n* add NFS server support for 32-bit clients, and 64-bit inodes\n* add memory accounting in UDP\n* add RFC 4303 compliant auditing support\n* add new algorithms and interfaces in IPsec\n* add authenc in crypto library\n\nGeneral Platform Support:\n\n* update on-demand governor driver\n* enable config options for IPMI panic handling\n* add HDMI support for AMD and ATI integrated chipsets\n* update OFED support to v1.3\n* update FireWire support to latest upstream\n* eliminate erroneous PCI Rom warning messages\n* add support to offline CPU when realtime processes are running\n\nArchitecture Specific Support:\n\nx86, AMD64, Intel(R) 64:\n\n* add support of pci=norom boot parameter to disable p2p rom window\n* enable pci=bfsort\n* increase boot command line size to 2048 for 64-bit architectures\n* add event based profiling support to AMD Greyhound systems\n* add Intel Dynamic Acceleration Technology\n\nIntel(R) 64:\n\n* add CMCI for hot-plugged processors\n* remove Intel(R) 64 stack hard limit of DEFAULT_USER_STACK_SIZE\n* add zonelist order sysctl/boot option on NUMA systems\n\n64-bit PowerPC:\n\n* add OProfile support to IBM Cell/B.E. platforms\n* update PMI driver for Cell blades\n* enable support of FB_RADEON driver for IBM Power6 blades\n* update ehea driver to latest upstream\n* add Scaled Processor Utilization of Resources Register SPURR support\n* boot Cell blades with more than 2GB memory\n* improve watchpoint support in GDB for power platform\n* improve hugepage allocation with memory-less nodes\n* add SLB shadow buffer support\n\nIBM System z:\n\n* add large page support to IBM System z\n* add IBM eServer zSeries HiperSockets MAC layer routing and IP packet\nsupport\n* add IBM z/VM monitor stream state 2 application support\n* add support for IBM z/VM DIAG 2FC for HYPFS\n* add AF_IUCV Protocol support on BSD socket interface\n* add dynamic CHPID reconfiguration support via SCLP\n\nNew Driver Support or Driver Updates:\n\nMiscellaneous Driver Updates:\n\n* add R500/R600 drm driver (X11 deccelerator driver) support\n* add trust computing/trust platfrom module\n* add support for Realtek ALC888S codec\n\nNetwork Driver Updates:\n\n* add bnx2x driver for Broadcom 10GbE hardware\n* add dm9601 driver support for DAVICOM\u0027s ZT6688\n* update bnx2, e1000, e1000e, tg3, forcedeth, igb, ixgb, and cxgb3 drivers\n* add WEXT scan capabilities to wireless extensions API\n* update mac80211/iwl4965 infrastructure\n* update cfg80211 driver to support mac80211/iwl4965\n* update ixgbe driver to support new Intel 10GbE hardware\n* add r8169 driver support for Realtek 8111c and 8101e loms\n* update bonding, netxen, and ioatdma driver\n\nStorage Driver Updates:\n\n* update aic94xx, areca, aacraid, cciss, ibmvSCSI driver\n* update ipr driver to add dual SAS RAID controller support\n* add iSCSI Boot Firmware Table tool support\n* update qla2xxx, mpt-fusion, lpfc, stex, megaraid_sas\n* update firmwire for Qlogic 25xxx\n* update SATA driver and infrastructure\n* add SB800/SB700/SB600 SATA/LAN support\n* add DRAC4 hotplug support\n* add hotplug docking support for some laptops\n* add uevent, and kobject to device mapper infrastructure for xDR/GDPs\n* update device mapper support\n\nFor a comprehensive list of kernel-related updates, refer to the latest\nversion of the Red Hat Enterprise Linux 5.2 release notes on:\n\nhttp://www.redhat.com/docs/manuals/enterprise/\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these packages,\nwhich apply these kernel updates.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2008:0314", "url": "https://access.redhat.com/errata/RHBA-2008:0314" }, { "category": "external", "summary": "209411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209411" }, { "category": "external", "summary": "210178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=210178" }, { "category": "external", "summary": "216722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216722" }, { "category": "external", "summary": "218298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218298" }, { "category": "external", "summary": "219338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=219338" }, { "category": "external", "summary": "221282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221282" }, { "category": "external", "summary": "221554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221554" }, { "category": "external", "summary": "221612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221612" }, { "category": "external", "summary": "223827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223827" }, { "category": "external", "summary": "224373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224373" }, { "category": "external", "summary": "224541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224541" }, { "category": "external", "summary": "224679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224679" }, { "category": "external", "summary": "230717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230717" }, { "category": "external", "summary": "231442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=231442" }, { "category": "external", "summary": "232748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232748" }, { "category": "external", "summary": "232885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232885" }, { "category": "external", "summary": "234426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=234426" }, { "category": "external", "summary": "236719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=236719" }, { "category": "external", "summary": "237326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237326" }, { "category": "external", "summary": "239061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239061" }, { "category": "external", "summary": "239673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239673" }, { "category": "external", "summary": "240006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240006" }, { "category": "external", "summary": "241338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241338" }, { "category": "external", "summary": "241540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241540" }, { "category": "external", "summary": "241728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241728" }, { "category": "external", "summary": "241899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241899" }, { "category": "external", "summary": "242813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242813" }, { "category": "external", "summary": "242955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242955" }, { "category": "external", "summary": "245042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245042" }, { "category": "external", "summary": "245217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245217" }, { "category": "external", "summary": "245674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245674" }, { "category": "external", "summary": "245715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245715" }, { "category": "external", "summary": "245823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245823" }, { "category": "external", "summary": "246130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246130" }, { "category": "external", "summary": "246722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246722" }, { "category": "external", "summary": "246723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246723" }, { "category": "external", "summary": "247118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247118" }, { "category": "external", "summary": "247174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247174" }, { "category": "external", "summary": "247379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247379" }, { "category": "external", "summary": "247596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247596" }, { "category": "external", "summary": "247877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247877" }, { "category": "external", "summary": "247982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247982" }, { "category": "external", "summary": "248052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248052" }, { "category": "external", "summary": "248534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248534" }, { "category": "external", "summary": "248716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248716" }, { "category": "external", "summary": "249415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249415" }, { "category": "external", "summary": "249728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249728" }, { "category": "external", "summary": "250427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250427" }, { "category": "external", "summary": "250442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250442" }, { "category": "external", "summary": "250537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250537" }, { "category": "external", "summary": "250766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250766" }, { "category": "external", "summary": "250994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250994" }, { "category": "external", "summary": "251043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251043" }, { "category": "external", "summary": "251189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251189" }, { "category": "external", "summary": "251527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251527" }, { "category": "external", "summary": "251557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251557" }, { "category": "external", "summary": "251902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251902" }, { "category": "external", "summary": "252264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=252264" }, { "category": "external", "summary": "253337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253337" }, { "category": "external", "summary": "253449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253449" }, { "category": "external", "summary": "253476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253476" }, { "category": "external", "summary": "253663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253663" }, { "category": "external", "summary": "253785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253785" }, { "category": "external", "summary": "253850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253850" }, { "category": "external", "summary": "253873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253873" }, { "category": "external", "summary": "253989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253989" }, { "category": "external", "summary": "254208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254208" }, { "category": "external", "summary": "254234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254234" }, { "category": "external", "summary": "256001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=256001" }, { "category": "external", "summary": "264721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=264721" }, { "category": "external", "summary": "268001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=268001" }, { "category": "external", "summary": "272201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272201" }, { "category": "external", "summary": "282881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=282881" }, { "category": "external", "summary": "284531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=284531" }, { "category": "external", "summary": "294811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294811" }, { "category": "external", "summary": "294881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294881" }, { "category": "external", "summary": "295501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295501" }, { "category": "external", "summary": "296531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296531" }, { "category": "external", "summary": "300871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=300871" }, { "category": "external", "summary": "307431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=307431" }, { "category": "external", "summary": "308971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=308971" }, { "category": "external", "summary": "309461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=309461" }, { "category": "external", "summary": "309551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=309551" }, { "category": "external", "summary": "309761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=309761" }, { "category": "external", "summary": "310801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=310801" }, { "category": "external", "summary": "314571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=314571" }, { "category": "external", "summary": "315471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=315471" }, { "category": "external", "summary": "316371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=316371" }, { "category": "external", "summary": "318061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=318061" }, { "category": "external", "summary": "318891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=318891" }, { "category": "external", "summary": "321111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=321111" }, { "category": "external", "summary": "325451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=325451" }, { "category": "external", "summary": "328321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=328321" }, { "category": "external", "summary": "329431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=329431" }, { "category": "external", "summary": "330181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=330181" }, { "category": "external", "summary": "336541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336541" }, { "category": "external", "summary": "356061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=356061" }, { "category": "external", "summary": "357391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=357391" }, { "category": "external", "summary": "358591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358591" }, { "category": "external", "summary": "358751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358751" }, { "category": "external", "summary": "358771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358771" }, { "category": "external", "summary": "358791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358791" }, { "category": "external", "summary": "358821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358821" }, { "category": "external", "summary": "358841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358841" }, { "category": "external", "summary": "358871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358871" }, { "category": "external", "summary": "358881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358881" }, { "category": "external", "summary": "360151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360151" }, { "category": "external", "summary": "360441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360441" }, { "category": "external", "summary": "360571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360571" }, { "category": "external", "summary": "360621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360621" }, { "category": "external", "summary": "363901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=363901" }, { "category": "external", "summary": "363961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=363961" }, { "category": "external", "summary": "364351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=364351" }, { "category": "external", "summary": "367251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367251" }, { "category": "external", "summary": "368851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=368851" }, { "category": "external", "summary": "369561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=369561" }, { "category": "external", "summary": "370341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=370341" }, { "category": "external", "summary": "370421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=370421" }, { "category": "external", "summary": "371341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=371341" }, { "category": "external", "summary": "371791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=371791" }, { "category": "external", "summary": "371971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=371971" }, { "category": "external", "summary": "373741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=373741" }, { "category": "external", "summary": "385681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=385681" }, { "category": "external", "summary": "388661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=388661" }, { "category": "external", "summary": "390071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=390071" }, { "category": "external", "summary": "392351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392351" }, { "category": "external", "summary": "394581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=394581" }, { "category": "external", "summary": "401631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=401631" }, { "category": "external", "summary": "403821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=403821" }, { "category": "external", "summary": "404561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404561" }, { "category": "external", "summary": "404571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404571" }, { "category": "external", "summary": "404711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404711" }, { "category": "external", "summary": "405521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=405521" }, { "category": "external", "summary": "408551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=408551" }, { "category": "external", "summary": "409221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=409221" }, { "category": "external", "summary": "410531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=410531" }, { "category": "external", "summary": "410811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=410811" }, { "category": "external", "summary": "412721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=412721" }, { "category": "external", "summary": "413941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=413941" }, { "category": "external", "summary": "417961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=417961" }, { "category": "external", "summary": "418721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=418721" }, { "category": "external", "summary": "419171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=419171" }, { "category": "external", "summary": "421021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=421021" }, { "category": "external", "summary": "421441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=421441" }, { "category": "external", "summary": "421451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=421451" }, { "category": "external", "summary": "422681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=422681" }, { "category": "external", "summary": "423731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=423731" }, { "category": "external", "summary": "423791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=423791" }, { "category": "external", "summary": "424511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=424511" }, { "category": "external", "summary": "425471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425471" }, { "category": "external", "summary": "426172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426172" }, { "category": "external", "summary": "426200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426200" }, { "category": "external", "summary": "426234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426234" }, { "category": "external", "summary": "426327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426327" }, { "category": "external", "summary": "426793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426793" }, { "category": "external", "summary": "426904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426904" }, { "category": "external", "summary": "427205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427205" }, { "category": "external", "summary": "427368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427368" }, { "category": "external", "summary": "427423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427423" }, { "category": "external", "summary": "427472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427472" }, { "category": "external", "summary": "427528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427528" }, { "category": "external", "summary": "428124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428124" }, { "category": "external", "summary": "428143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428143" }, { "category": "external", "summary": "428291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428291" }, { "category": "external", "summary": "428331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428331" }, { "category": "external", "summary": "428479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428479" }, { "category": "external", "summary": "428612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428612" }, { "category": "external", "summary": "428693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428693" }, { "category": "external", "summary": "428920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428920" }, { "category": "external", "summary": "428945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428945" }, { "category": "external", "summary": "428963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428963" }, { "category": "external", "summary": "429074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429074" }, { "category": "external", "summary": "429109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429109" }, { "category": "external", "summary": "429168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429168" }, { "category": "external", "summary": "429205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429205" }, { "category": "external", "summary": "429417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429417" }, { "category": "external", "summary": "429747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429747" }, { "category": "external", "summary": "429755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429755" }, { "category": "external", "summary": "429877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429877" }, { "category": "external", "summary": "430130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430130" }, { "category": "external", "summary": "430310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430310" }, { "category": "external", "summary": "430662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430662" }, { "category": "external", "summary": "430722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430722" }, { "category": "external", "summary": "430725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430725" }, { "category": "external", "summary": "430729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430729" }, { "category": "external", "summary": "430938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430938" }, { "category": "external", "summary": "430940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430940" }, { "category": "external", "summary": "430947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430947" }, { "category": "external", "summary": "431001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431001" }, { "category": "external", "summary": "431004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431004" }, { "category": "external", "summary": "431052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431052" }, { "category": "external", "summary": "432343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432343" }, { "category": "external", "summary": "432370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432370" }, { "category": "external", "summary": "432626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432626" }, { "category": "external", "summary": "432652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432652" }, { "category": "external", "summary": "432824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432824" }, { "category": "external", "summary": "433038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433038" }, { "category": "external", "summary": "433481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433481" }, { "category": "external", "summary": "433554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433554" }, { "category": "external", "summary": "433671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433671" }, { "category": "external", "summary": "434158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434158" }, { "category": "external", "summary": "434736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434736" }, { "category": "external", "summary": "434741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434741" }, { "category": "external", "summary": "434792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434792" }, { "category": "external", "summary": "434992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434992" }, { "category": "external", "summary": "435243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435243" }, { "category": "external", "summary": "435456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435456" }, { "category": "external", "summary": "435658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435658" }, { "category": "external", "summary": "435670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435670" }, { "category": "external", "summary": "436131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436131" }, { "category": "external", "summary": "436267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436267" }, { "category": "external", "summary": "436351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436351" }, { "category": "external", "summary": "436775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436775" }, { "category": "external", "summary": "437252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437252" }, { "category": "external", "summary": "437412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437412" }, { "category": "external", "summary": "438032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438032" }, { "category": "external", "summary": "438214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438214" }, { "category": "external", "summary": "438720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438720" }, { "category": "external", "summary": "438741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438741" }, { "category": "external", "summary": "438776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438776" }, { "category": "external", "summary": "438919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438919" }, { "category": "external", "summary": "439254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439254" }, { "category": "external", "summary": "439304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439304" }, { "category": "external", "summary": "439316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439316" }, { "category": "external", "summary": "439380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439380" }, { "category": "external", "summary": "439874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439874" }, { "category": "external", "summary": "441390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441390" }, { "category": "external", "summary": "441425", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441425" }, { "category": "external", "summary": "441779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441779" }, { "category": "external", "summary": "442101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442101" }, { "category": "external", "summary": "442368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442368" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhba-2008_0314.json" } ], "title": "Red Hat Bug Fix Advisory: Updated kernel packages for Red Hat Enterprise Linux 5.2", "tracking": { "current_release_date": "2024-11-22T02:03:03+00:00", "generator": { "date": "2024-11-22T02:03:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2008:0314", "initial_release_date": "2008-05-21T00:00:00+00:00", "revision_history": [ { "date": "2008-05-21T00:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T14:43:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:03:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-92.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-92.el5.i686", "product_id": "kernel-PAE-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-92.el5.i686", "product_id": "kernel-xen-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-92.el5.i686", "product_id": "kernel-debug-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-0:2.6.18-92.el5.i686", "product_id": "kernel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-92.el5.i386", "product_id": "kernel-headers-0:2.6.18-92.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-92.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-92.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-92.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-92.el5.noarch", "product_id": "kernel-doc-0:2.6.18-92.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.src", "product": { "name": "kernel-0:2.6.18-92.el5.src", "product_id": "kernel-0:2.6.18-92.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-92.el5.ia64", "product_id": "kernel-devel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-92.el5.ia64", "product_id": "kernel-xen-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-92.el5.ia64", "product_id": "kernel-debug-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-0:2.6.18-92.el5.ia64", "product_id": "kernel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-92.el5.ia64", "product_id": "kernel-headers-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-92.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-92.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-92.el5.ppc", "product_id": "kernel-headers-0:2.6.18-92.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-92.el5.s390x", "product_id": "kernel-devel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-92.el5.s390x", "product_id": "kernel-debug-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-92.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-0:2.6.18-92.el5.s390x", "product_id": "kernel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-92.el5.s390x", "product_id": "kernel-headers-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.src" }, "product_reference": "kernel-0:2.6.18-92.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-92.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.src" }, "product_reference": "kernel-0:2.6.18-92.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-92.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5906", "discovery_date": "2007-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "377501" } ], "notes": [ { "category": "description", "text": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel-xen 3.1.1 virtual guest system denial of service (hypervisor crash) possibility", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5906" }, { "category": "external", "summary": "RHBZ#377501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=377501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5906", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5906" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-21T00:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHBA-2008:0314" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel-xen 3.1.1 virtual guest system denial of service (hypervisor crash) possibility" }, { "cve": "CVE-2008-2365", "discovery_date": "2007-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "449359" } ], "notes": [ { "category": "description", "text": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2365" }, { "category": "external", "summary": "RHBZ#449359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2365", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365" } ], "release_date": "2008-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-21T00:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHBA-2008:0314" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race" } ] }
gsd-2007-5906
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2007-5906", "description": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.", "id": "GSD-2007-5906", "references": [ "https://www.suse.com/security/cve/CVE-2007-5906.html", "https://access.redhat.com/errata/RHBA-2008:0314" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-5906" ], "details": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.", "id": "GSD-2007-5906", "modified": "2023-12-13T01:21:40.878350Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28412", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28412" }, { "name": "SUSE-SR:2008:002", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" }, { "name": "[Xen-devel] 20071031 [PATCH, fixed] x86: fix debug register handling", "refsource": "MLIST", "url": "http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html" }, { "name": "28405", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28405" }, { "name": "27219", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27219" }, { "name": "28636", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28636" }, { "name": "SUSE-SR:2008:001", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xensource_inc:xen:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5906" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "[Xen-devel] 20071031 [PATCH, fixed] x86: fix debug register handling", "refsource": "MLIST", "tags": [ "Patch" ], "url": "http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html" }, { "name": "SUSE-SR:2008:001", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" }, { "name": "27219", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/27219" }, { "name": "28405", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28405" }, { "name": "28412", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28412" }, { "name": "SUSE-SR:2008:002", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" }, { "name": "28636", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28636" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2008-09-05T21:31Z", "publishedDate": "2007-11-09T19:46Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.