Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0600 (GCVE-0-2008-0600)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:54:21.972Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"name": "27801",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27801"
},
{
"name": "MDVSA-2008:043",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"name": "oval:org.mitre.oval:def:11358",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"name": "28858",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28858"
},
{
"name": "DSA-1494",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"name": "USN-577-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"name": "SUSE-SA:2008:007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"name": "28875",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28875"
},
{
"name": "28933",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28933"
},
{
"name": "FEDORA-2008-1629",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
},
{
"name": "ADV-2008-0487",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"name": "SUSE-SA:2008:013",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "28889",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28889"
},
{
"name": "28937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28937"
},
{
"name": "FEDORA-2008-1433",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"name": "FEDORA-2008-1422",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"name": "5092",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"name": "MDVSA-2008:044",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "29245",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29245"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"name": "28896",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28896"
},
{
"name": "28925",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28925"
},
{
"name": "28835",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28835"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"name": "FEDORA-2008-1423",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"name": "20080212 rPSA-2008-0052-1 kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"name": "28912",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28912"
},
{
"name": "SUSE-SA:2008:030",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"name": "RHSA-2008:0129",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"name": "1019393",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019393"
},
{
"name": "30818",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30818"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"name": "27704",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27704"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-02-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"name": "27801",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27801"
},
{
"name": "MDVSA-2008:043",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"name": "oval:org.mitre.oval:def:11358",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"name": "28858",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28858"
},
{
"name": "DSA-1494",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"name": "USN-577-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"name": "SUSE-SA:2008:007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"name": "28875",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28875"
},
{
"name": "28933",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28933"
},
{
"name": "FEDORA-2008-1629",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
},
{
"name": "ADV-2008-0487",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"name": "SUSE-SA:2008:013",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "28889",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28889"
},
{
"name": "28937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28937"
},
{
"name": "FEDORA-2008-1433",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"name": "FEDORA-2008-1422",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"name": "5092",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"name": "MDVSA-2008:044",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "29245",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29245"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"name": "28896",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28896"
},
{
"name": "28925",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28925"
},
{
"name": "28835",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28835"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"name": "FEDORA-2008-1423",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"name": "20080212 rPSA-2008-0052-1 kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"name": "28912",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28912"
},
{
"name": "SUSE-SA:2008:030",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"name": "RHSA-2008:0129",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"name": "1019393",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019393"
},
{
"name": "30818",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30818"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"name": "27704",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27704"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-0600",
"datePublished": "2008-02-12T20:00:00",
"dateReserved": "2008-02-05T00:00:00",
"dateUpdated": "2024-08-07T07:54:21.972Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2008-0600\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-02-12T21:00:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n vmsplice_to_pipe en el Kernel linux de la versi\u00f3n 2.6.17 a la 2.6.24.1 no valida ciertos espacios de memoria antes de referenciarlos, lo que permite a usuarios locales obtener privilegios de root/administrador a trav\u00e9s de argumentos manipulados en una llamada al sistema del tipo vmsplice. Esta es una vulnerabilidad distinta de CVE-2008-0009 y CVE-2008-0010.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1E1A8B-6FA1-45AD-B034-EC34884527DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8CBD2D9-3765-40B2-A056-D71BE750CC01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F4D967-ED04-42EA-8B3E-36301D39D651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C498EE89-7F07-4B1E-90E6-5897E6B04670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*\",\"matchCriteriaId\":\"708656AF-92AE-4EAF-AF19-F457DB04ADB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B263AB8-74A4-4C73-915C-A02724C24B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96D739B-9E8B-4D2F-9DED-4C9B313473CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"903FE5D3-A9FB-466D-833B-448233BB0803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"958EDC43-0848-4D93-9D07-6A085A5940B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAD8BE9-A05B-40E8-80DF-0B2878968BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D123AAFE-3F17-45C4-9382-BA392FD022C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/28835\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28858\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28875\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28889\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28896\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28912\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28925\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28933\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28937\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1019393\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0052\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1494\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:043\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0129.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/488009/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27704\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/27801\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-577-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0487/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432229\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432517\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2237\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.exploit-db.com/exploits/5092\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/28835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28912\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1019393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0129.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/488009/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/27801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-577-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0487/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=432517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/5092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4. Updated kernel packages are available to correct this issue for Red Hat Enterprise Linux 5:\\nhttps://rhn.redhat.com/errata/RHSA-2008-0129.html\",\"lastModified\":\"2008-02-13T00:00:00\"}]}}"
}
}
ghsa-vv62-ccxv-738x
Vulnerability from github
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
{
"affected": [],
"aliases": [
"CVE-2008-0600"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-02-12T21:00:00Z",
"severity": "HIGH"
},
"details": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.",
"id": "GHSA-vv62-ccxv-738x",
"modified": "2022-05-01T23:31:47Z",
"published": "2022-05-01T23:31:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2008-0600"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28835"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28858"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28875"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28889"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28896"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28912"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28925"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28933"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28937"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29245"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30818"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1019393"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/27704"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/27801"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
}
],
"schema_version": "1.4.0",
"severity": []
}
fkie_cve-2008-0600
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html | ||
| secalert@redhat.com | http://marc.info/?l=linux-kernel&m=120263652322197&w=2 | Exploit | |
| secalert@redhat.com | http://marc.info/?l=linux-kernel&m=120264520431307&w=2 | Exploit | |
| secalert@redhat.com | http://marc.info/?l=linux-kernel&m=120264773202422&w=2 | Exploit | |
| secalert@redhat.com | http://marc.info/?l=linux-kernel&m=120266328220808&w=2 | Exploit | |
| secalert@redhat.com | http://marc.info/?l=linux-kernel&m=120266353621139&w=2 | Exploit | |
| secalert@redhat.com | http://secunia.com/advisories/28835 | ||
| secalert@redhat.com | http://secunia.com/advisories/28858 | ||
| secalert@redhat.com | http://secunia.com/advisories/28875 | ||
| secalert@redhat.com | http://secunia.com/advisories/28889 | ||
| secalert@redhat.com | http://secunia.com/advisories/28896 | ||
| secalert@redhat.com | http://secunia.com/advisories/28912 | ||
| secalert@redhat.com | http://secunia.com/advisories/28925 | ||
| secalert@redhat.com | http://secunia.com/advisories/28933 | ||
| secalert@redhat.com | http://secunia.com/advisories/28937 | ||
| secalert@redhat.com | http://secunia.com/advisories/29245 | ||
| secalert@redhat.com | http://secunia.com/advisories/30818 | ||
| secalert@redhat.com | http://securitytracker.com/id?1019393 | ||
| secalert@redhat.com | http://wiki.rpath.com/Advisories:rPSA-2008-0052 | ||
| secalert@redhat.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052 | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1494 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:043 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:044 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0129.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/488009/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/27704 | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/27801 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-577-1 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/0487/references | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=432229 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=432517 | ||
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-2237 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358 | ||
| secalert@redhat.com | https://www.exploit-db.com/exploits/5092 | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=120263652322197&w=2 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=120264520431307&w=2 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=120264773202422&w=2 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=120266328220808&w=2 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=120266353621139&w=2 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28835 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28858 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28875 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28889 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28896 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28912 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28925 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28933 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28937 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29245 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30818 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1019393 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2008-0052 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1494 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:043 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:044 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0129.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/488009/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/27704 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/27801 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-577-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0487/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=432229 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=432517 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-2237 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/5092 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17 | |
| linux | linux_kernel | 2.6.17.1 | |
| linux | linux_kernel | 2.6.17.2 | |
| linux | linux_kernel | 2.6.17.3 | |
| linux | linux_kernel | 2.6.17.4 | |
| linux | linux_kernel | 2.6.17.5 | |
| linux | linux_kernel | 2.6.17.6 | |
| linux | linux_kernel | 2.6.17.7 | |
| linux | linux_kernel | 2.6.17.8 | |
| linux | linux_kernel | 2.6.17.9 | |
| linux | linux_kernel | 2.6.17.10 | |
| linux | linux_kernel | 2.6.17.11 | |
| linux | linux_kernel | 2.6.17.12 | |
| linux | linux_kernel | 2.6.17.13 | |
| linux | linux_kernel | 2.6.17.14 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18.1 | |
| linux | linux_kernel | 2.6.18.2 | |
| linux | linux_kernel | 2.6.18.3 | |
| linux | linux_kernel | 2.6.18.4 | |
| linux | linux_kernel | 2.6.18.5 | |
| linux | linux_kernel | 2.6.18.6 | |
| linux | linux_kernel | 2.6.18.7 | |
| linux | linux_kernel | 2.6.18.8 | |
| linux | linux_kernel | 2.6.19 | |
| linux | linux_kernel | 2.6.19 | |
| linux | linux_kernel | 2.6.19 | |
| linux | linux_kernel | 2.6.19 | |
| linux | linux_kernel | 2.6.19 | |
| linux | linux_kernel | 2.6.19.1 | |
| linux | linux_kernel | 2.6.19.2 | |
| linux | linux_kernel | 2.6.19.3 | |
| linux | linux_kernel | 2.6.20 | |
| linux | linux_kernel | 2.6.20 | |
| linux | linux_kernel | 2.6.20.1 | |
| linux | linux_kernel | 2.6.20.2 | |
| linux | linux_kernel | 2.6.20.3 | |
| linux | linux_kernel | 2.6.20.4 | |
| linux | linux_kernel | 2.6.20.5 | |
| linux | linux_kernel | 2.6.20.6 | |
| linux | linux_kernel | 2.6.20.7 | |
| linux | linux_kernel | 2.6.20.8 | |
| linux | linux_kernel | 2.6.20.9 | |
| linux | linux_kernel | 2.6.20.10 | |
| linux | linux_kernel | 2.6.20.11 | |
| linux | linux_kernel | 2.6.20.12 | |
| linux | linux_kernel | 2.6.20.13 | |
| linux | linux_kernel | 2.6.20.14 | |
| linux | linux_kernel | 2.6.20.15 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21 | |
| linux | linux_kernel | 2.6.21.1 | |
| linux | linux_kernel | 2.6.21.2 | |
| linux | linux_kernel | 2.6.21.3 | |
| linux | linux_kernel | 2.6.21.4 | |
| linux | linux_kernel | 2.6.22 | |
| linux | linux_kernel | 2.6.22 | |
| linux | linux_kernel | 2.6.22.1 | |
| linux | linux_kernel | 2.6.22.3 | |
| linux | linux_kernel | 2.6.22.4 | |
| linux | linux_kernel | 2.6.22.5 | |
| linux | linux_kernel | 2.6.22.6 | |
| linux | linux_kernel | 2.6.22.7 | |
| linux | linux_kernel | 2.6.22.16 | |
| linux | linux_kernel | 2.6.23 | |
| linux | linux_kernel | 2.6.23 | |
| linux | linux_kernel | 2.6.23 | |
| linux | linux_kernel | 2.6.23.1 | |
| linux | linux_kernel | 2.6.23.2 | |
| linux | linux_kernel | 2.6.23.3 | |
| linux | linux_kernel | 2.6.23.4 | |
| linux | linux_kernel | 2.6.23.5 | |
| linux | linux_kernel | 2.6.23.6 | |
| linux | linux_kernel | 2.6.23.7 | |
| linux | linux_kernel | 2.6.23.9 | |
| linux | linux_kernel | 2.6.23.14 | |
| linux | linux_kernel | 2.6.24 | |
| linux | linux_kernel | 2.6.24 | |
| linux | linux_kernel | 2.6.24 | |
| linux | linux_kernel | 2.6.24.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D97ED16-D6B7-4445-889C-4D6DE2EDC49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DFFB2843-A867-48EC-97D7-B106C7BBAED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB1E1A8B-6FA1-45AD-B034-EC34884527DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"matchCriteriaId": "C8CBD2D9-3765-40B2-A056-D71BE750CC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"matchCriteriaId": "A8F4D967-ED04-42EA-8B3E-36301D39D651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"matchCriteriaId": "C498EE89-7F07-4B1E-90E6-5897E6B04670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"matchCriteriaId": "708656AF-92AE-4EAF-AF19-F457DB04ADB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"matchCriteriaId": "3B263AB8-74A4-4C73-915C-A02724C24B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"matchCriteriaId": "A96D739B-9E8B-4D2F-9DED-4C9B313473CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"matchCriteriaId": "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"matchCriteriaId": "247E13CB-9B11-4B64-80AD-C0F8482CCC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"matchCriteriaId": "903FE5D3-A9FB-466D-833B-448233BB0803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"matchCriteriaId": "958EDC43-0848-4D93-9D07-6A085A5940B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"matchCriteriaId": "AD35F21D-0A28-4C14-BCF5-8EDA760701C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"matchCriteriaId": "3AAD8BE9-A05B-40E8-80DF-0B2878968BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"matchCriteriaId": "D123AAFE-3F17-45C4-9382-BA392FD022C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF566DA-0F04-48DA-AA40-565979C55328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0E249774-CE05-43D5-A5A3-7CCE24BB2AD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D42BA44-C69B-4170-9867-CABF93CA9BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"matchCriteriaId": "67F2047A-5F17-4B59-9075-41A5DC5C1CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9A12DE15-E192-4B90-ADB7-A886B3746DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"matchCriteriaId": "FF6588E7-F4FA-40F5-8945-FC7B6094376E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010."
},
{
"lang": "es",
"value": "La funci\u00f3n vmsplice_to_pipe en el Kernel linux de la versi\u00f3n 2.6.17 a la 2.6.24.1 no valida ciertos espacios de memoria antes de referenciarlos, lo que permite a usuarios locales obtener privilegios de root/administrador a trav\u00e9s de argumentos manipulados en una llamada al sistema del tipo vmsplice. Esta es una vulnerabilidad distinta de CVE-2008-0009 y CVE-2008-0010."
}
],
"id": "CVE-2008-0600",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-02-12T21:00:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28835"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28858"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28875"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28889"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28896"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28912"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28925"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28933"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28937"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29245"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/30818"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1019393"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/27704"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/27801"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"source": "secalert@redhat.com",
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28835"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28875"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28896"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28912"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28925"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28933"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30818"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1019393"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/27704"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/27801"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vendorComments": [
{
"comment": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4. Updated kernel packages are available to correct this issue for Red Hat Enterprise Linux 5:\nhttps://rhn.redhat.com/errata/RHSA-2008-0129.html",
"lastModified": "2008-02-13T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
RHSA-2008:0129
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA flaw was found in vmsplice. An unprivileged local user could use this\nflaw to gain root privileges. (CVE-2008-0600)\n\nRed Hat is aware that a public exploit for this issue is available. This\nissue did not affect the Linux kernels distributed with Red Hat Enterprise\nLinux 2.1, 3, or 4.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0129",
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "432251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0129.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:53+00:00",
"generator": {
"date": "2025-11-21T17:32:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0129",
"initial_release_date": "2008-02-12T16:53:00+00:00",
"revision_history": [
{
"date": "2008-02-12T16:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-02-12T11:54:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.13.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.src",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.src",
"product_id": "kernel-0:2.6.18-53.1.13.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-0600",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2008-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432251"
}
],
"notes": [
{
"category": "description",
"text": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel vmsplice_to_pipe flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0600"
},
{
"category": "external",
"summary": "RHBZ#432251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600"
}
],
"release_date": "2008-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-02-12T16:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel vmsplice_to_pipe flaw"
}
]
}
rhsa-2008:0129
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA flaw was found in vmsplice. An unprivileged local user could use this\nflaw to gain root privileges. (CVE-2008-0600)\n\nRed Hat is aware that a public exploit for this issue is available. This\nissue did not affect the Linux kernels distributed with Red Hat Enterprise\nLinux 2.1, 3, or 4.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0129",
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "432251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0129.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:53+00:00",
"generator": {
"date": "2025-11-21T17:32:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0129",
"initial_release_date": "2008-02-12T16:53:00+00:00",
"revision_history": [
{
"date": "2008-02-12T16:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-02-12T11:54:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.13.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.src",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.src",
"product_id": "kernel-0:2.6.18-53.1.13.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-0600",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2008-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432251"
}
],
"notes": [
{
"category": "description",
"text": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel vmsplice_to_pipe flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0600"
},
{
"category": "external",
"summary": "RHBZ#432251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600"
}
],
"release_date": "2008-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-02-12T16:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel vmsplice_to_pipe flaw"
}
]
}
rhsa-2008_0129
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA flaw was found in vmsplice. An unprivileged local user could use this\nflaw to gain root privileges. (CVE-2008-0600)\n\nRed Hat is aware that a public exploit for this issue is available. This\nissue did not affect the Linux kernels distributed with Red Hat Enterprise\nLinux 2.1, 3, or 4.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0129",
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "432251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0129.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T01:48:15+00:00",
"generator": {
"date": "2024-11-22T01:48:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0129",
"initial_release_date": "2008-02-12T16:53:00+00:00",
"revision_history": [
{
"date": "2008-02-12T16:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-02-12T11:54:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:48:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.13.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.13.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.src",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.src",
"product_id": "kernel-0:2.6.18-53.1.13.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.13.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.13.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.13.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.src"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-53.1.13.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-0600",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2008-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "432251"
}
],
"notes": [
{
"category": "description",
"text": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel vmsplice_to_pipe flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0600"
},
{
"category": "external",
"summary": "RHBZ#432251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0600"
}
],
"release_date": "2008-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-02-12T16:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0129"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Client:kernel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-0:2.6.18-53.1.13.el5.src",
"5Client:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Client:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-0:2.6.18-53.1.13.el5.src",
"5Server:kernel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debug-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-devel-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-53.1.13.el5.noarch",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.i386",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.s390x",
"5Server:kernel-headers-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-53.1.13.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-53.1.13.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-53.1.13.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel vmsplice_to_pipe flaw"
}
]
}
CERTA-2008-AVI-067
Vulnerability from certfr_avis
Une vulnérabilité dans le noyau Linux permet à un utilisateur local d'élever ses privilèges.
Description
Une erreur dans la gestion des tubes ou « pipes » est présente dans le noyau Linux des systèmes d'exploitations GNU/Linux. Celle-ci permet à un utilisateur malintentionné, local au système, d'aquérir les privilèges du super-utilisateur root.
Solution
La version 2.6.24.2 du noyau Linux corrige le problème :
http://www.kernel.org
Pour les différentes distributions GNU/Linux, se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Linux versions 2.6.24.1 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eLinux versions 2.6.24.1 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nUne erreur dans la gestion des tubes ou \u00ab pipes \u00bb est pr\u00e9sente dans le\nnoyau Linux des syst\u00e8mes d\u0027exploitations GNU/Linux. Celle-ci permet \u00e0 un\nutilisateur malintentionn\u00e9, local au syst\u00e8me, d\u0027aqu\u00e9rir les privil\u00e8ges\ndu super-utilisateur root.\n\n## Solution\n\nLa version 2.6.24.2 du noyau Linux corrige le probl\u00e8me :\n\n http://www.kernel.org\n\nPour les diff\u00e9rentes distributions GNU/Linux, se r\u00e9f\u00e9rer au bulletin de\ns\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section\nDocumentation).\n",
"cves": [
{
"name": "CVE-2008-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0600"
},
{
"name": "CVE-2008-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0010"
},
{
"name": "CVE-2008-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0009"
}
],
"initial_release_date": "2008-02-11T00:00:00",
"last_revision_date": "2008-02-13T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2008:0129 du 12 f\u00e9vrier 2008 :",
"url": "https://rhn.redhat.com/errata/RHSA-2008-0129.html"
},
{
"title": "Site du noyau Linux :",
"url": "http://www.kernel.org"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2008:043 du 11 f\u00e9vrier 2008 :",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:043"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2008:007 du 12 f\u00e9vrier 2008 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.6.24.2 du noyau Linux :",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1494 du 11 f\u00e9vrier 2008 :",
"url": "http://www.debian.org/security/2008/DSA-1494"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-577 du 12 f\u00e9vrier 2008 :",
"url": "https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-February/000664.html"
}
],
"reference": "CERTA-2008-AVI-067",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2008-02-11T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences CVE et des bulletins de s\u00e9curit\u00e9 Debian, Mandriva et SuSE ;",
"revision_date": "2008-02-12T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins RedHat et Ubuntu.",
"revision_date": "2008-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans le noyau Linux permet \u00e0 un utilisateur local\nd\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 du noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.6.24.2 du noyau Linux",
"url": null
}
]
}
gsd-2008-0600
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2008-0600",
"description": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.",
"id": "GSD-2008-0600",
"references": [
"https://www.suse.com/security/cve/CVE-2008-0600.html",
"https://www.debian.org/security/2008/dsa-1494",
"https://access.redhat.com/errata/RHSA-2008:0129",
"https://linux.oracle.com/cve/CVE-2008-0600.html",
"https://packetstormsecurity.com/files/cve/CVE-2008-0600"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-0600"
],
"details": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.",
"id": "GSD-2008-0600",
"modified": "2023-12-13T01:22:58.331465Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0600",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/28835",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28835"
},
{
"name": "http://secunia.com/advisories/28875",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28875"
},
{
"name": "http://secunia.com/advisories/28896",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28896"
},
{
"name": "http://www.debian.org/security/2008/dsa-1494",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"name": "http://www.securityfocus.com/bid/27704",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/27704"
},
{
"name": "http://www.vupen.com/english/advisories/2008/0487/references",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"name": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"name": "http://secunia.com/advisories/28858",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28858"
},
{
"name": "http://secunia.com/advisories/28889",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28889"
},
{
"name": "http://secunia.com/advisories/28912",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28912"
},
{
"name": "http://secunia.com/advisories/28925",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28925"
},
{
"name": "http://secunia.com/advisories/28933",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28933"
},
{
"name": "http://secunia.com/advisories/28937",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28937"
},
{
"name": "http://secunia.com/advisories/29245",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29245"
},
{
"name": "http://secunia.com/advisories/30818",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30818"
},
{
"name": "http://securitytracker.com/id?1019393",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1019393"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0052",
"refsource": "MISC",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052",
"refsource": "MISC",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0129.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"name": "http://www.securityfocus.com/archive/1/488009/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/27801",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/27801"
},
{
"name": "http://www.ubuntu.com/usn/usn-577-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432229",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432517",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"name": "https://issues.rpath.com/browse/RPL-2237",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"name": "https://www.exploit-db.com/exploits/5092",
"refsource": "MISC",
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0600"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264773202422\u0026w=2"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120263652322197\u0026w=2"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120264520431307\u0026w=2"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266328220808\u0026w=2"
},
{
"name": "[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=120266353621139\u0026w=2"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0052",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0052"
},
{
"name": "DSA-1494",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1494"
},
{
"name": "FEDORA-2008-1422",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html"
},
{
"name": "FEDORA-2008-1423",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html"
},
{
"name": "MDVSA-2008:043",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:043"
},
{
"name": "MDVSA-2008:044",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:044"
},
{
"name": "RHSA-2008:0129",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0129.html"
},
{
"name": "SUSE-SA:2008:007",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html"
},
{
"name": "USN-577-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-577-1"
},
{
"name": "27704",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/27704"
},
{
"name": "28835",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28835"
},
{
"name": "28858",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28858"
},
{
"name": "28875",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28875"
},
{
"name": "28896",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28896"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432229",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432229"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432517",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432517"
},
{
"name": "https://issues.rpath.com/browse/RPL-2237",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-2237"
},
{
"name": "FEDORA-2008-1433",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html"
},
{
"name": "FEDORA-2008-1629",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html"
},
{
"name": "1019393",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1019393"
},
{
"name": "28889",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28889"
},
{
"name": "28912",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28912"
},
{
"name": "28925",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28925"
},
{
"name": "28933",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28933"
},
{
"name": "28937",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28937"
},
{
"name": "SUSE-SA:2008:013",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html"
},
{
"name": "27801",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/27801"
},
{
"name": "29245",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29245"
},
{
"name": "30818",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30818"
},
{
"name": "SUSE-SA:2008:030",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
},
{
"name": "ADV-2008-0487",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0487/references"
},
{
"name": "5092",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/5092"
},
{
"name": "oval:org.mitre.oval:def:11358",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358"
},
{
"name": "20080212 rPSA-2008-0052-1 kernel",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/488009/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:18Z",
"publishedDate": "2008-02-12T21:00Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.