Action not permitted
Modal body text goes here.
cve-2008-2365
Vulnerability from cvelistv5
Published
2008-06-30 21:00
Modified
2024-08-07 08:58
Severity ?
EPSS score ?
Summary
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:02.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "linux-kernel-ptraceattach-dos(43567)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43567" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9" }, { "name": "1020362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020362" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap" }, { "name": "29945", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29945" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87" }, { "name": "[oss-security] 20080714 Re: CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions \u003c= 2.6.25", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/14/1" }, { "name": "3965", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3965" }, { "name": "oval:org.mitre.oval:def:10749", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749" }, { "name": "30850", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30850" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de" }, { "name": "31107", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31107" }, { "name": "[oss-security] 20080626 CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions \u003c= 2.6.25", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/26/1" }, { "name": "USN-625-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-625-1" }, { "name": "RHSA-2008:0508", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html" }, { "name": "[linux-kernel] 20070508 Re: [PATCH -utrace] Move utrace into task_struct", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "linux-kernel-ptraceattach-dos(43567)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43567" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9" }, { "name": "1020362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020362" }, { "tags": [ "x_refsource_MISC" ], "url": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap" }, { "name": "29945", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29945" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87" }, { "name": "[oss-security] 20080714 Re: CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions \u003c= 2.6.25", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/14/1" }, { "name": "3965", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3965" }, { "name": "oval:org.mitre.oval:def:10749", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749" }, { "name": "30850", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30850" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de" }, { "name": "31107", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31107" }, { "name": "[oss-security] 20080626 CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions \u003c= 2.6.25", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/26/1" }, { "name": "USN-625-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-625-1" }, { "name": "RHSA-2008:0508", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html" }, { "name": "[linux-kernel] 20070508 Re: [PATCH -utrace] Move utrace into task_struct", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-2365", "datePublished": "2008-06-30T21:00:00", "dateReserved": "2008-05-21T00:00:00", "dateUpdated": "2024-08-07T08:58:02.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-2365\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-06-30T21:41:00.000\",\"lastModified\":\"2024-11-21T00:46:43.267\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \\\"late ptrace_may_attach() check\\\" and \\\"race around \u0026dead_engine_ops setting,\\\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.\"},{\"lang\":\"es\",\"value\":\"Una condici\u00f3n de carrera en el soporte de ptrace and utrace en el kernel de Linux versi\u00f3n 2.6.9 hasta 2.6.25, tal y como es usado en Red Hat Enterprise Linux (RHEL) versi\u00f3n 4, permite a los usuarios locales causar una denegaci\u00f3n de servicio (oops) por medio de una larga serie de llamadas ptrace de PTRACE_ATTACH hacia otros procesos de usuario que desencadena un conflicto entre utrace_detach y report_quiescent, relacionado con \\\"late ptrace_may_attach() check\\\" y \\\"race around \u0026dead_engine_ops setting,\\\" una vulnerabilidad diferente de los CVE-2007-0771 y CVE-2008-1514. NOTA: este problema solo puede afectar a las versiones del kernel anterior a 2.6.16.x.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2422569B-02ED-4028-83D8-D778657596B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66E4653-1A55-4827-888B-E0776E32ED28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"169446DE-67F8-4738-91FE-ED8058118F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7BBB5F-44F7-467F-B934-33ABF744A107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0478831E-87B2-441F-AEC2-403A35FED1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B879D6-4631-49A8-9366-75577DFB755D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"390B1E09-7014-4A74-834C-806BBEBAF6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF02479-2124-4655-A38D-A4793D3B8A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"903FE5D3-A9FB-466D-833B-448233BB0803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"958EDC43-0848-4D93-9D07-6A085A5940B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D0AFF0-8CA9-42EF-A20E-3CD6E7DDF016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3D19AD-4268-45E7-B13D-BC93ABDF2226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E619E6-A515-43BC-B371-C1FF6DAA6CCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*\",\"matchCriteriaId\":\"49EF5B77-9BC9-4AE8-A677-48E5E576BE63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*\",\"matchCriteriaId\":\"36389D32-61C1-4487-8399-FA7D2864FACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*\",\"matchCriteriaId\":\"49B67F74-AF8F-4A27-AA8A-A8479E256A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D74A418-50F0-42C0-ABBC-BBBE718FF025\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0508.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/30850\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31107\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/3965\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/26/1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/07/14/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/29945\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1020362\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-625-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=449359\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43567\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0508.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/30850\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/3965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/26/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/07/14/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29945\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1020362\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-625-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=449359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2008-2365
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-2365", "description": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "id": "GSD-2008-2365", "references": [ "https://www.suse.com/security/cve/CVE-2008-2365.html", "https://access.redhat.com/errata/RHSA-2008:0508", "https://access.redhat.com/errata/RHBA-2008:0314", "https://linux.oracle.com/cve/CVE-2008-2365.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-2365" ], "details": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "id": "GSD-2008-2365", "modified": "2023-12-13T01:23:01.102102Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-2365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/31107", "refsource": "MISC", "url": "http://secunia.com/advisories/31107" }, { "name": "http://www.ubuntu.com/usn/usn-625-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-625-1" }, { "name": "http://rhn.redhat.com/errata/RHSA-2008-0508.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html" }, { "name": "http://secunia.com/advisories/30850", "refsource": "MISC", "url": "http://secunia.com/advisories/30850" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9" }, { "name": "http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2" }, { "name": "http://securityreason.com/securityalert/3965", "refsource": "MISC", "url": "http://securityreason.com/securityalert/3965" }, { "name": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap", "refsource": "MISC", "url": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap" }, { "name": "http://www.openwall.com/lists/oss-security/2008/06/26/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2008/06/26/1" }, { "name": "http://www.openwall.com/lists/oss-security/2008/07/14/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2008/07/14/1" }, { "name": "http://www.securityfocus.com/bid/29945", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/29945" }, { "name": "http://www.securitytracker.com/id?1020362", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1020362" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43567", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43567" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=449359", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-2365" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-kernel] 20070508 Re: [PATCH -utrace] Move utrace into task_struct", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2" }, { "name": "[oss-security] 20080626 CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions \u003c= 2.6.25", "refsource": "MLIST", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/26/1" }, { "name": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap", "refsource": "MISC", "tags": [], "url": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=449359", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "name": "RHSA-2008:0508", "refsource": "REDHAT", "tags": [ "Patch" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html" }, { "name": "29945", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/29945" }, { "name": "[oss-security] 20080714 Re: CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions \u003c= 2.6.25", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2008/07/14/1" }, { "name": "31107", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31107" }, { "name": "1020362", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1020362" }, { "name": "30850", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30850" }, { "name": "USN-625-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-625-1" }, { "name": "3965", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/3965" }, { "name": "linux-kernel-ptraceattach-dos(43567)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43567" }, { "name": "oval:org.mitre.oval:def:10749", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:19Z", "publishedDate": "2008-06-30T21:41Z" } } }
rhsa-2008_0508
Vulnerability from csaf_redhat
Published
2008-06-25 15:13
Modified
2024-11-22 02:21
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and a bug are now
available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* A security flaw was found in the Linux kernel memory copy routines, when
running on certain AMD64 systems. If an unsuccessful attempt to copy kernel
memory from source to destination memory locations occurred, the copy
routines did not zero the content at the destination memory location. This
could allow a local unprivileged user to view potentially sensitive data.
(CVE-2008-2729, Important)
* Alexey Dobriyan discovered a race condition in the Linux kernel
process-tracing system call, ptrace. A local unprivileged user could
use this flaw to cause a denial of service (kernel hang).
(CVE-2008-2365, Important)
* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and
64-bit emulation. This could allow a local unprivileged user to prepare and
run a specially crafted binary, which would use this deficiency to leak
uninitialized and potentially sensitive data. (CVE-2008-0598, Important)
* It was discovered that the Linux kernel handled string operations in the
opposite way to the GNU Compiler Collection (GCC). This could allow a local
unprivileged user to cause memory corruption. (CVE-2008-1367, Low)
As well, these updated packages fix the following bug:
* On systems with a large number of CPUs (more than 16), multiple
applications calling the "times()" system call may have caused a system
hang.
Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and a bug are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* A security flaw was found in the Linux kernel memory copy routines, when\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\nmemory from source to destination memory locations occurred, the copy\nroutines did not zero the content at the destination memory location. This\ncould allow a local unprivileged user to view potentially sensitive data.\n(CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to prepare and\nrun a specially crafted binary, which would use this deficiency to leak\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in the\nopposite way to the GNU Compiler Collection (GCC). This could allow a local\nunprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug:\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the \"times()\" system call may have caused a system\nhang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0508", "url": "https://access.redhat.com/errata/RHSA-2008:0508" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "433938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433938" }, { "category": "external", "summary": "437312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312" }, { "category": "external", "summary": "449101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449101" }, { "category": "external", "summary": "449359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "category": "external", "summary": "451271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451271" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0508.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:21:14+00:00", "generator": { "date": "2024-11-22T02:21:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0508", "initial_release_date": "2008-06-25T15:13:00+00:00", "revision_history": [ { "date": "2008-06-25T15:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-25T11:18:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:21:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.20.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.20.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "product_id": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-67.0.20.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.ia64", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.ia64", "product_id": "kernel-0:2.6.9-67.0.20.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.20.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.20.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.src", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.src", "product_id": "kernel-0:2.6.9-67.0.20.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.ppc64", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64", "product_id": "kernel-0:2.6.9-67.0.20.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.20.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.20.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.s390x", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.s390x", "product_id": "kernel-0:2.6.9-67.0.20.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.20.EL.s390", "product": { "name": "kernel-0:2.6.9-67.0.20.EL.s390", "product_id": "kernel-0:2.6.9-67.0.20.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.20.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.20.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "product_id": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.20.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.20.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.20.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.20.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.20.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.20.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0598", "discovery_date": "2008-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "433938" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: linux x86_64 ia32 emulation leaks uninitialized data", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0598" }, { "category": "external", "summary": "RHBZ#433938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0598", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0598" } ], "release_date": "2008-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-25T15:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0508" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: linux x86_64 ia32 emulation leaks uninitialized data" }, { "cve": "CVE-2008-1367", "discovery_date": "2008-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "437312" } ], "notes": [ { "category": "description", "text": "gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel doesn\u0027t clear DF for signal handlers", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1367" }, { "category": "external", "summary": "RHBZ#437312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1367", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1367" } ], "release_date": "2008-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-25T15:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0508" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel doesn\u0027t clear DF for signal handlers" }, { "cve": "CVE-2008-2365", "discovery_date": "2007-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "449359" } ], "notes": [ { "category": "description", "text": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2365" }, { "category": "external", "summary": "RHBZ#449359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2365", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365" } ], "release_date": "2008-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-25T15:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0508" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race" }, { "cve": "CVE-2008-2729", "discovery_date": "2008-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "451271" } ], "notes": [ { "category": "description", "text": "arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: [x86_64] The string instruction version didn\u0027t zero the output on exception.", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2729" }, { "category": "external", "summary": "RHBZ#451271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2729", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2729" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2729", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2729" } ], "release_date": "2006-08-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-25T15:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-0:2.6.9-67.0.20.EL.src", "4AS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.20.EL.src", "4Desktop:kernel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-0:2.6.9-67.0.20.EL.src", "4ES:kernel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-0:2.6.9-67.0.20.EL.src", "4WS:kernel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.20.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.20.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.20.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0508" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: [x86_64] The string instruction version didn\u0027t zero the output on exception." } ] }
rhba-2008_0314
Vulnerability from csaf_redhat
Published
2008-05-21 00:00
Modified
2024-11-22 02:03
Summary
Red Hat Bug Fix Advisory: Updated kernel packages for Red Hat Enterprise Linux 5.2
Notes
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 5. This is the second
regular update.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
General Kernel Feature Support:
* rebase xen packages to version 3.1.2
* performance improvements and bug fixes for GFS2
* update utrace support
* add eCryptfs support
* add NFS server support for 32-bit clients, and 64-bit inodes
* add memory accounting in UDP
* add RFC 4303 compliant auditing support
* add new algorithms and interfaces in IPsec
* add authenc in crypto library
General Platform Support:
* update on-demand governor driver
* enable config options for IPMI panic handling
* add HDMI support for AMD and ATI integrated chipsets
* update OFED support to v1.3
* update FireWire support to latest upstream
* eliminate erroneous PCI Rom warning messages
* add support to offline CPU when realtime processes are running
Architecture Specific Support:
x86, AMD64, Intel(R) 64:
* add support of pci=norom boot parameter to disable p2p rom window
* enable pci=bfsort
* increase boot command line size to 2048 for 64-bit architectures
* add event based profiling support to AMD Greyhound systems
* add Intel Dynamic Acceleration Technology
Intel(R) 64:
* add CMCI for hot-plugged processors
* remove Intel(R) 64 stack hard limit of DEFAULT_USER_STACK_SIZE
* add zonelist order sysctl/boot option on NUMA systems
64-bit PowerPC:
* add OProfile support to IBM Cell/B.E. platforms
* update PMI driver for Cell blades
* enable support of FB_RADEON driver for IBM Power6 blades
* update ehea driver to latest upstream
* add Scaled Processor Utilization of Resources Register SPURR support
* boot Cell blades with more than 2GB memory
* improve watchpoint support in GDB for power platform
* improve hugepage allocation with memory-less nodes
* add SLB shadow buffer support
IBM System z:
* add large page support to IBM System z
* add IBM eServer zSeries HiperSockets MAC layer routing and IP packet
support
* add IBM z/VM monitor stream state 2 application support
* add support for IBM z/VM DIAG 2FC for HYPFS
* add AF_IUCV Protocol support on BSD socket interface
* add dynamic CHPID reconfiguration support via SCLP
New Driver Support or Driver Updates:
Miscellaneous Driver Updates:
* add R500/R600 drm driver (X11 deccelerator driver) support
* add trust computing/trust platfrom module
* add support for Realtek ALC888S codec
Network Driver Updates:
* add bnx2x driver for Broadcom 10GbE hardware
* add dm9601 driver support for DAVICOM's ZT6688
* update bnx2, e1000, e1000e, tg3, forcedeth, igb, ixgb, and cxgb3 drivers
* add WEXT scan capabilities to wireless extensions API
* update mac80211/iwl4965 infrastructure
* update cfg80211 driver to support mac80211/iwl4965
* update ixgbe driver to support new Intel 10GbE hardware
* add r8169 driver support for Realtek 8111c and 8101e loms
* update bonding, netxen, and ioatdma driver
Storage Driver Updates:
* update aic94xx, areca, aacraid, cciss, ibmvSCSI driver
* update ipr driver to add dual SAS RAID controller support
* add iSCSI Boot Firmware Table tool support
* update qla2xxx, mpt-fusion, lpfc, stex, megaraid_sas
* update firmwire for Qlogic 25xxx
* update SATA driver and infrastructure
* add SB800/SB700/SB600 SATA/LAN support
* add DRAC4 hotplug support
* add hotplug docking support for some laptops
* add uevent, and kobject to device mapper infrastructure for xDR/GDPs
* update device mapper support
For a comprehensive list of kernel-related updates, refer to the latest
version of the Red Hat Enterprise Linux 5.2 release notes on:
http://www.redhat.com/docs/manuals/enterprise/
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which apply these kernel updates.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support and\nmaintenance of Red Hat Enterprise Linux version 5. This is the second\nregular update.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nGeneral Kernel Feature Support:\n\n* rebase xen packages to version 3.1.2\n* performance improvements and bug fixes for GFS2\n* update utrace support\n* add eCryptfs support\n* add NFS server support for 32-bit clients, and 64-bit inodes\n* add memory accounting in UDP\n* add RFC 4303 compliant auditing support\n* add new algorithms and interfaces in IPsec\n* add authenc in crypto library\n\nGeneral Platform Support:\n\n* update on-demand governor driver\n* enable config options for IPMI panic handling\n* add HDMI support for AMD and ATI integrated chipsets\n* update OFED support to v1.3\n* update FireWire support to latest upstream\n* eliminate erroneous PCI Rom warning messages\n* add support to offline CPU when realtime processes are running\n\nArchitecture Specific Support:\n\nx86, AMD64, Intel(R) 64:\n\n* add support of pci=norom boot parameter to disable p2p rom window\n* enable pci=bfsort\n* increase boot command line size to 2048 for 64-bit architectures\n* add event based profiling support to AMD Greyhound systems\n* add Intel Dynamic Acceleration Technology\n\nIntel(R) 64:\n\n* add CMCI for hot-plugged processors\n* remove Intel(R) 64 stack hard limit of DEFAULT_USER_STACK_SIZE\n* add zonelist order sysctl/boot option on NUMA systems\n\n64-bit PowerPC:\n\n* add OProfile support to IBM Cell/B.E. platforms\n* update PMI driver for Cell blades\n* enable support of FB_RADEON driver for IBM Power6 blades\n* update ehea driver to latest upstream\n* add Scaled Processor Utilization of Resources Register SPURR support\n* boot Cell blades with more than 2GB memory\n* improve watchpoint support in GDB for power platform\n* improve hugepage allocation with memory-less nodes\n* add SLB shadow buffer support\n\nIBM System z:\n\n* add large page support to IBM System z\n* add IBM eServer zSeries HiperSockets MAC layer routing and IP packet\nsupport\n* add IBM z/VM monitor stream state 2 application support\n* add support for IBM z/VM DIAG 2FC for HYPFS\n* add AF_IUCV Protocol support on BSD socket interface\n* add dynamic CHPID reconfiguration support via SCLP\n\nNew Driver Support or Driver Updates:\n\nMiscellaneous Driver Updates:\n\n* add R500/R600 drm driver (X11 deccelerator driver) support\n* add trust computing/trust platfrom module\n* add support for Realtek ALC888S codec\n\nNetwork Driver Updates:\n\n* add bnx2x driver for Broadcom 10GbE hardware\n* add dm9601 driver support for DAVICOM\u0027s ZT6688\n* update bnx2, e1000, e1000e, tg3, forcedeth, igb, ixgb, and cxgb3 drivers\n* add WEXT scan capabilities to wireless extensions API\n* update mac80211/iwl4965 infrastructure\n* update cfg80211 driver to support mac80211/iwl4965\n* update ixgbe driver to support new Intel 10GbE hardware\n* add r8169 driver support for Realtek 8111c and 8101e loms\n* update bonding, netxen, and ioatdma driver\n\nStorage Driver Updates:\n\n* update aic94xx, areca, aacraid, cciss, ibmvSCSI driver\n* update ipr driver to add dual SAS RAID controller support\n* add iSCSI Boot Firmware Table tool support\n* update qla2xxx, mpt-fusion, lpfc, stex, megaraid_sas\n* update firmwire for Qlogic 25xxx\n* update SATA driver and infrastructure\n* add SB800/SB700/SB600 SATA/LAN support\n* add DRAC4 hotplug support\n* add hotplug docking support for some laptops\n* add uevent, and kobject to device mapper infrastructure for xDR/GDPs\n* update device mapper support\n\nFor a comprehensive list of kernel-related updates, refer to the latest\nversion of the Red Hat Enterprise Linux 5.2 release notes on:\n\nhttp://www.redhat.com/docs/manuals/enterprise/\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these packages,\nwhich apply these kernel updates.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2008:0314", "url": "https://access.redhat.com/errata/RHBA-2008:0314" }, { "category": "external", "summary": "209411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209411" }, { "category": "external", "summary": "210178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=210178" }, { "category": "external", "summary": "216722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216722" }, { "category": "external", "summary": "218298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218298" }, { "category": "external", "summary": "219338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=219338" }, { "category": "external", "summary": "221282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221282" }, { "category": "external", "summary": "221554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221554" }, { "category": "external", "summary": "221612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221612" }, { "category": "external", "summary": "223827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223827" }, { "category": "external", "summary": "224373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224373" }, { "category": "external", "summary": "224541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224541" }, { "category": "external", "summary": "224679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224679" }, { "category": "external", "summary": "230717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230717" }, { "category": "external", "summary": "231442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=231442" }, { "category": "external", "summary": "232748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232748" }, { "category": "external", "summary": "232885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232885" }, { "category": "external", "summary": "234426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=234426" }, { "category": "external", "summary": "236719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=236719" }, { "category": "external", "summary": "237326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237326" }, { "category": "external", "summary": "239061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239061" }, { "category": "external", "summary": "239673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239673" }, { "category": "external", "summary": "240006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240006" }, { "category": "external", "summary": "241338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241338" }, { "category": "external", "summary": "241540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241540" }, { "category": "external", "summary": "241728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241728" }, { "category": "external", "summary": "241899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241899" }, { "category": "external", "summary": "242813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242813" }, { "category": "external", "summary": "242955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242955" }, { "category": "external", "summary": "245042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245042" }, { "category": "external", "summary": "245217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245217" }, { "category": "external", "summary": "245674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245674" }, { "category": "external", "summary": "245715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245715" }, { "category": "external", "summary": "245823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245823" }, { "category": "external", "summary": "246130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246130" }, { "category": "external", "summary": "246722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246722" }, { "category": "external", "summary": "246723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246723" }, { "category": "external", "summary": "247118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247118" }, { "category": "external", "summary": "247174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247174" }, { "category": "external", "summary": "247379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247379" }, { "category": "external", "summary": "247596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247596" }, { "category": "external", "summary": "247877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247877" }, { "category": "external", "summary": "247982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247982" }, { "category": "external", "summary": "248052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248052" }, { "category": "external", "summary": "248534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248534" }, { "category": "external", "summary": "248716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248716" }, { "category": "external", "summary": "249415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249415" }, { "category": "external", "summary": "249728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249728" }, { "category": "external", "summary": "250427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250427" }, { "category": "external", "summary": "250442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250442" }, { "category": "external", "summary": "250537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250537" }, { "category": "external", "summary": "250766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250766" }, { "category": "external", "summary": "250994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250994" }, { "category": "external", "summary": "251043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251043" }, { "category": "external", "summary": "251189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251189" }, { "category": "external", "summary": "251527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251527" }, { "category": "external", "summary": "251557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251557" }, { "category": "external", "summary": "251902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251902" }, { "category": "external", "summary": "252264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=252264" }, { "category": "external", "summary": "253337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253337" }, { "category": "external", "summary": "253449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253449" }, { "category": "external", "summary": "253476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253476" }, { "category": "external", "summary": "253663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253663" }, { "category": "external", "summary": "253785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253785" }, { "category": "external", "summary": "253850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253850" }, { "category": "external", "summary": "253873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253873" }, { "category": "external", "summary": "253989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253989" }, { "category": "external", "summary": "254208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254208" }, { "category": "external", "summary": "254234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254234" }, { "category": "external", "summary": "256001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=256001" }, { "category": "external", "summary": "264721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=264721" }, { "category": "external", "summary": "268001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=268001" }, { "category": "external", "summary": "272201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=272201" }, { "category": "external", "summary": "282881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=282881" }, { "category": "external", "summary": "284531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=284531" }, { "category": "external", "summary": "294811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294811" }, { "category": "external", "summary": "294881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294881" }, { "category": "external", "summary": "295501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295501" }, { "category": "external", "summary": "296531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=296531" }, { "category": "external", "summary": "300871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=300871" }, { "category": "external", "summary": "307431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=307431" }, { "category": "external", "summary": "308971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=308971" }, { "category": "external", "summary": "309461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=309461" }, { "category": "external", "summary": "309551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=309551" }, { "category": "external", "summary": "309761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=309761" }, { "category": "external", "summary": "310801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=310801" }, { "category": "external", "summary": "314571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=314571" }, { "category": "external", "summary": "315471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=315471" }, { "category": "external", "summary": "316371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=316371" }, { "category": "external", "summary": "318061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=318061" }, { "category": "external", "summary": "318891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=318891" }, { "category": "external", "summary": "321111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=321111" }, { "category": "external", "summary": "325451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=325451" }, { "category": "external", "summary": "328321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=328321" }, { "category": "external", "summary": "329431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=329431" }, { "category": "external", "summary": "330181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=330181" }, { "category": "external", "summary": "336541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336541" }, { "category": "external", "summary": "356061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=356061" }, { "category": "external", "summary": "357391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=357391" }, { "category": "external", "summary": "358591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358591" }, { "category": "external", "summary": "358751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358751" }, { "category": "external", "summary": "358771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358771" }, { "category": "external", "summary": "358791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358791" }, { "category": "external", "summary": "358821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358821" }, { "category": "external", "summary": "358841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358841" }, { "category": "external", "summary": "358871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358871" }, { "category": "external", "summary": "358881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358881" }, { "category": "external", "summary": "360151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360151" }, { "category": "external", "summary": "360441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360441" }, { "category": "external", "summary": "360571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360571" }, { "category": "external", "summary": "360621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=360621" }, { "category": "external", "summary": "363901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=363901" }, { "category": "external", "summary": "363961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=363961" }, { "category": "external", "summary": "364351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=364351" }, { "category": "external", "summary": "367251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367251" }, { "category": "external", "summary": "368851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=368851" }, { "category": "external", "summary": "369561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=369561" }, { "category": "external", "summary": "370341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=370341" }, { "category": "external", "summary": "370421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=370421" }, { "category": "external", "summary": "371341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=371341" }, { "category": "external", "summary": "371791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=371791" }, { "category": "external", "summary": "371971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=371971" }, { "category": "external", "summary": "373741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=373741" }, { "category": "external", "summary": "385681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=385681" }, { "category": "external", "summary": "388661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=388661" }, { "category": "external", "summary": "390071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=390071" }, { "category": "external", "summary": "392351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392351" }, { "category": "external", "summary": "394581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=394581" }, { "category": "external", "summary": "401631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=401631" }, { "category": "external", "summary": "403821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=403821" }, { "category": "external", "summary": "404561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404561" }, { "category": "external", "summary": "404571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404571" }, { "category": "external", "summary": "404711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404711" }, { "category": "external", "summary": "405521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=405521" }, { "category": "external", "summary": "408551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=408551" }, { "category": "external", "summary": "409221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=409221" }, { "category": "external", "summary": "410531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=410531" }, { "category": "external", "summary": "410811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=410811" }, { "category": "external", "summary": "412721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=412721" }, { "category": "external", "summary": "413941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=413941" }, { "category": "external", "summary": "417961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=417961" }, { "category": "external", "summary": "418721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=418721" }, { "category": "external", "summary": "419171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=419171" }, { "category": "external", "summary": "421021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=421021" }, { "category": "external", "summary": "421441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=421441" }, { "category": "external", "summary": "421451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=421451" }, { "category": "external", "summary": "422681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=422681" }, { "category": "external", "summary": "423731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=423731" }, { "category": "external", "summary": "423791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=423791" }, { "category": "external", "summary": "424511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=424511" }, { "category": "external", "summary": "425471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425471" }, { "category": "external", "summary": "426172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426172" }, { "category": "external", "summary": "426200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426200" }, { "category": "external", "summary": "426234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426234" }, { "category": "external", "summary": "426327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426327" }, { "category": "external", "summary": "426793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426793" }, { "category": "external", "summary": "426904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426904" }, { "category": "external", "summary": "427205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427205" }, { "category": "external", "summary": "427368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427368" }, { "category": "external", "summary": "427423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427423" }, { "category": "external", "summary": "427472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427472" }, { "category": "external", "summary": "427528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427528" }, { "category": "external", "summary": "428124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428124" }, { "category": "external", "summary": "428143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428143" }, { "category": "external", "summary": "428291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428291" }, { "category": "external", "summary": "428331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428331" }, { "category": "external", "summary": "428479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428479" }, { "category": "external", "summary": "428612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428612" }, { "category": "external", "summary": "428693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428693" }, { "category": "external", "summary": "428920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428920" }, { "category": "external", "summary": "428945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428945" }, { "category": "external", "summary": "428963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428963" }, { "category": "external", "summary": "429074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429074" }, { "category": "external", "summary": "429109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429109" }, { "category": "external", "summary": "429168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429168" }, { "category": "external", "summary": "429205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429205" }, { "category": "external", "summary": "429417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429417" }, { "category": "external", "summary": "429747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429747" }, { "category": "external", "summary": "429755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429755" }, { "category": "external", "summary": "429877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429877" }, { "category": "external", "summary": "430130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430130" }, { "category": "external", "summary": "430310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430310" }, { "category": "external", "summary": "430662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430662" }, { "category": "external", "summary": "430722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430722" }, { "category": "external", "summary": "430725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430725" }, { "category": "external", "summary": "430729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430729" }, { "category": "external", "summary": "430938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430938" }, { "category": "external", "summary": "430940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430940" }, { "category": "external", "summary": "430947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430947" }, { "category": "external", "summary": "431001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431001" }, { "category": "external", "summary": "431004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431004" }, { "category": "external", "summary": "431052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431052" }, { "category": "external", "summary": "432343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432343" }, { "category": "external", "summary": "432370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432370" }, { "category": "external", "summary": "432626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432626" }, { "category": "external", "summary": "432652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432652" }, { "category": "external", "summary": "432824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432824" }, { "category": "external", "summary": "433038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433038" }, { "category": "external", "summary": "433481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433481" }, { "category": "external", "summary": "433554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433554" }, { "category": "external", "summary": "433671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433671" }, { "category": "external", "summary": "434158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434158" }, { "category": "external", "summary": "434736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434736" }, { "category": "external", "summary": "434741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434741" }, { "category": "external", "summary": "434792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434792" }, { "category": "external", "summary": "434992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434992" }, { "category": "external", "summary": "435243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435243" }, { "category": "external", "summary": "435456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435456" }, { "category": "external", "summary": "435658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435658" }, { "category": "external", "summary": "435670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435670" }, { "category": "external", "summary": "436131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436131" }, { "category": "external", "summary": "436267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436267" }, { "category": "external", "summary": "436351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436351" }, { "category": "external", "summary": "436775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436775" }, { "category": "external", "summary": "437252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437252" }, { "category": "external", "summary": "437412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437412" }, { "category": "external", "summary": "438032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438032" }, { "category": "external", "summary": "438214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438214" }, { "category": "external", "summary": "438720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438720" }, { "category": "external", "summary": "438741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438741" }, { "category": "external", "summary": "438776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438776" }, { "category": "external", "summary": "438919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438919" }, { "category": "external", "summary": "439254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439254" }, { "category": "external", "summary": "439304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439304" }, { "category": "external", "summary": "439316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439316" }, { "category": "external", "summary": "439380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439380" }, { "category": "external", "summary": "439874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439874" }, { "category": "external", "summary": "441390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441390" }, { "category": "external", "summary": "441425", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441425" }, { "category": "external", "summary": "441779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441779" }, { "category": "external", "summary": "442101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442101" }, { "category": "external", "summary": "442368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442368" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhba-2008_0314.json" } ], "title": "Red Hat Bug Fix Advisory: Updated kernel packages for Red Hat Enterprise Linux 5.2", "tracking": { "current_release_date": "2024-11-22T02:03:03+00:00", "generator": { "date": "2024-11-22T02:03:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2008:0314", "initial_release_date": "2008-05-21T00:00:00+00:00", "revision_history": [ { "date": "2008-05-21T00:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T14:43:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:03:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-92.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-92.el5.i686", "product_id": "kernel-PAE-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-92.el5.i686", "product_id": "kernel-xen-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-92.el5.i686", "product_id": "kernel-debug-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-0:2.6.18-92.el5.i686", "product_id": "kernel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-92.el5.i386", "product_id": "kernel-headers-0:2.6.18-92.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-92.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-92.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-92.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-92.el5.noarch", "product_id": "kernel-doc-0:2.6.18-92.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.src", "product": { "name": "kernel-0:2.6.18-92.el5.src", "product_id": "kernel-0:2.6.18-92.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-92.el5.ia64", "product_id": "kernel-devel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-92.el5.ia64", "product_id": "kernel-xen-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-92.el5.ia64", "product_id": "kernel-debug-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-0:2.6.18-92.el5.ia64", "product_id": "kernel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-92.el5.ia64", "product_id": "kernel-headers-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-92.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-92.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-92.el5.ppc", "product_id": "kernel-headers-0:2.6.18-92.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-92.el5.s390x", "product_id": "kernel-devel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-92.el5.s390x", "product_id": "kernel-debug-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-92.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-0:2.6.18-92.el5.s390x", "product_id": "kernel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-92.el5.s390x", "product_id": "kernel-headers-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.src" }, "product_reference": "kernel-0:2.6.18-92.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-92.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.src" }, "product_reference": "kernel-0:2.6.18-92.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-92.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5906", "discovery_date": "2007-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "377501" } ], "notes": [ { "category": "description", "text": "Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel-xen 3.1.1 virtual guest system denial of service (hypervisor crash) possibility", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5906" }, { "category": "external", "summary": "RHBZ#377501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=377501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5906", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5906" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-21T00:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHBA-2008:0314" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel-xen 3.1.1 virtual guest system denial of service (hypervisor crash) possibility" }, { "cve": "CVE-2008-2365", "discovery_date": "2007-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "449359" } ], "notes": [ { "category": "description", "text": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2365" }, { "category": "external", "summary": "RHBZ#449359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2365", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365" } ], "release_date": "2008-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-21T00:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-92.el5.i686", "5Client:kernel-0:2.6.18-92.el5.ia64", "5Client:kernel-0:2.6.18-92.el5.ppc64", "5Client:kernel-0:2.6.18-92.el5.s390x", "5Client:kernel-0:2.6.18-92.el5.src", "5Client:kernel-0:2.6.18-92.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.i686", "5Client:kernel-debug-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Client:kernel-devel-0:2.6.18-92.el5.i686", "5Client:kernel-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-devel-0:2.6.18-92.el5.x86_64", "5Client:kernel-doc-0:2.6.18-92.el5.noarch", "5Client:kernel-headers-0:2.6.18-92.el5.i386", "5Client:kernel-headers-0:2.6.18-92.el5.ia64", "5Client:kernel-headers-0:2.6.18-92.el5.ppc", "5Client:kernel-headers-0:2.6.18-92.el5.ppc64", "5Client:kernel-headers-0:2.6.18-92.el5.s390x", "5Client:kernel-headers-0:2.6.18-92.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Client:kernel-xen-0:2.6.18-92.el5.i686", "5Client:kernel-xen-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-0:2.6.18-92.el5.i686", "5Server:kernel-0:2.6.18-92.el5.ia64", "5Server:kernel-0:2.6.18-92.el5.ppc64", "5Server:kernel-0:2.6.18-92.el5.s390x", "5Server:kernel-0:2.6.18-92.el5.src", "5Server:kernel-0:2.6.18-92.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.i686", "5Server:kernel-debug-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-92.el5.x86_64", "5Server:kernel-devel-0:2.6.18-92.el5.i686", "5Server:kernel-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-devel-0:2.6.18-92.el5.x86_64", "5Server:kernel-doc-0:2.6.18-92.el5.noarch", "5Server:kernel-headers-0:2.6.18-92.el5.i386", "5Server:kernel-headers-0:2.6.18-92.el5.ia64", "5Server:kernel-headers-0:2.6.18-92.el5.ppc", "5Server:kernel-headers-0:2.6.18-92.el5.ppc64", "5Server:kernel-headers-0:2.6.18-92.el5.s390x", "5Server:kernel-headers-0:2.6.18-92.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-92.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-92.el5.s390x", "5Server:kernel-xen-0:2.6.18-92.el5.i686", "5Server:kernel-xen-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-92.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-92.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-92.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHBA-2008:0314" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race" } ] }
ghsa-rv47-5vwq-v454
Vulnerability from github
Published
2022-05-01 23:49
Modified
2022-05-01 23:49
Details
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
{ "affected": [], "aliases": [ "CVE-2008-2365" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-06-30T21:41:00Z", "severity": "MODERATE" }, "details": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user\u0027s process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around \u0026dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "id": "GHSA-rv47-5vwq-v454", "modified": "2022-05-01T23:49:11Z", "published": "2022-05-01T23:49:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2365" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43567" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=117863520707703\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/30850" }, { "type": "WEB", "url": "http://secunia.com/advisories/31107" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3965" }, { "type": "WEB", "url": "http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2008/06/26/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2008/07/14/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/29945" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1020362" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-625-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.